SlideShare a Scribd company logo
1 of 22
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
DOI: 10.5121/ijcsit.2023.15406 67
EXPLORING CLOUD COMPUTING ADOPTION IN
HIGHER EDUCATIONAL ENVIRONMENT: AN
EXTENSION OF THE TPB MODEL WITH TRUST,
PEER INFLUENCES, PERCEIVED USEFULNESS AND
EASE OF USE
Waleed Al-Ghaith
Imam Mohammad Ibn Saud Islamic University (IMSIU)
ABSTRACT
Cloud computing is regarded as the next generation of computing. It is progressively being used as a
launching pad for digital innovation and organizational agility. Cloud computing is frequently used by
private and public organizations due to its flexibility, collaboration, cost-effectiveness, and scalability.
These characteristics make cloud computing indispensable for individuals and businesses such as higher
education institutes. Several prior studies covered the technological facets of cloud-based contexts,
including cloud security, scalability, and virtualization. However, it is contend that the main barrier to
cloud computing isn't technical but cognitive or behavioural, and in particular attitudinal. Thus, this
research aims to study higher education’ students’ attitudes and their intention to adopt cloud computing,
with a specific concentration on the effect of trust, peer influences, perceived usefulness and ease of use in
order to investigate the factors influencing the adoption of cloud computing in higher educational
environment in Saudi Arabia. This study presents an extended Decomposed Theory of Planned Behaviour
(DTPB) to include trust, peer influences, perceived usefulness and ease of use as a cognition, representing
a person’s perception of social influence to perform or not perform a behaviour under consideration. The
proposed model was able to explain 62% of the variance in behavioural intention and 65% of students'
attitudes towards the adoption of cloud computing in higher educational environment. The study's findings
show that the proposed model explained a significant amount of variation in cloud computing adoption. It
suggests that the model expansion by incorporating trust, peer influences, perceived usefulness and ease of
use factors were valuable explorations. Further, the findings demonstrate that university students' attitudes
toward using cloud computing are significantly influenced by perceived ease of use, trust in cloud
computing service provider and perceived usefulness, which have the ability to explain their attitude by
22.15%, 21.9% and 20.9% respectively. The result also shows that "subjective norm" alone explains
33.95% of students' "behavioural intentions" towards using cloud computing, followed by their "attitude,"
which explains around 14.24% of "behavioural intentions," and then university students’ "self-efficacy,"
with 13.71%..
KEYWORDS
Cloud Computing, DTPB, Trust, Technology Acceptance, Peer influences, Perceived usefulness, Perceived
ease of use.
1. INTRODUCTION
Emerging innovations in cloud computing have piqued the interest of IT professionals across the
world. Cloud computing is an advanced form of distributed networking that enables the sharing
of hardware and software assets among various public and private sectors and businesses [1]. The
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
68
notion of "cloud computing" means the hardware and systems that are used to provide services,
as well as the applications that are created and distributed via the Internet [2].
Cloud computing is regarded as the next generation of computing. It is progressively being used
as a launching pad for digital innovation and organizational agility. Cloud computing is
frequently used by private and public firms due to its cost-effectiveness, scalability, collaboration
and flexibility. These characteristics make cloud computing indispensable for individuals and
businesses such as higher education institutes. Research and Markets [3] reported that the global
Cloud Computing in Higher Education market was worth more than us$ 2,182.4 million in 2020
and is expected to grow to USD 8,779.1 million by 2027. Cloud computing has emerged as a
crucial technology in the modern era, and it is now designated the fifth utility following the four
fundamental utilities, namely, electricity, water, gas, and telecommunication [4], [5].
Higher education institutions are experiencing difficulties with the recruitment of participants, the
demand for IT, the quality of education services, and affordability [6]; [7]; [5]. Thus, higher
education institutions work diligently to manage resources and offer better services [8]; [9].
Higher education institutions represented by educators and students have found the benefits
offered by cloud computing, such as cost reduction, educational sustainability, and raising
educational quality, an opportunity to achieve their goals [10]; [11]; [12]. The adoption of cloud
computing in higher education institutions is gaining ground, but it is still considered to lag
behind the commercial sector and even government organizations in this market [13]. Yet, it is
increasingly becoming a necessary element of higher education institutions' offerings rather than
an option, which has boosted competitiveness in the higher education market [14]. However,
despite its numerous benefits, cloud computing still faces significant barriers among university
students to adopt it. Many students are comfortable with traditional methods of storing data, such
as USB drives or hard disks. They may also be skeptical about relying on third-party providers
for their data storage needs.
A number of earlier studies covered the technological facets of cloud contexts, including cloud
scalability, virtualization, and security [15]; [16]. However, it is contend that the most significant
barrier to cloud computing is not technical but rather cognitive or behavioural, particularly
attitudinal [17]; [18]. Thus, this research aims to study university students’ students’ attitudes and
their intention to adopt cloud computing, in order to investigate the factors influencing the
adoption of cloud computing among higher education students in Saudi Arabia. This study
develops a conceptual model based on the Theory of Planned Behaviour (TPB) that lends itself to
investigating these factors. Moreover, this study extends TPB to investigate drivers of cloud
adoption among higher education students in Saudi Arabia by placing peer influences, perceived
usefulness, ease of use, and "trust" of cloud computing providers as new constructs within the
TPB model. A quantity of research has recognized and anticipated the importance of "trust" in
cloud computing providers, perceived ease of use, perceived usefulness and peer influences in
cloud computing settings, but merely scarce scholars have investigated the impact these factors
have on attitudes and behavioural intentions toward cloud computing usage. The study's objective
is to further comprehend higher education students' attitudes toward cloud computing.
This research will participate to the body of extant literature by elucidating the "trust" role in
cloud computing providers, perceived ease of use, perceived usefulness and peer influences in
cloud adoption behaviour. Additionally, it will validate whether the TPB is a reliable model
based on its ability to explain higher education students' attitudes and intents in the cloud
environment. This begs the following research question: what factors affect higher education
students’ attitudes and their intention to adopt cloud computing? The rest of this paper addresses
this question by presenting and extending the TPB as a potential theory for explaining differences
in adoption behaviour. This paper is organized as follows: the following section presents relevant
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
69
earlier studies on cloud computing and the study's theoretical framework, which includes the TPB
as the main theory that guides the development of the study model. The third section discusses
the development of research hypotheses and the study model. The fourth section describes the
study methodology, including its measurements and applied data collection procedures. The fifth
section presents the research data analysis and its findings, which cover the reliability and
validity of the study instrument and the hypotheses testing findings. The next section provides a
discussion that includes the implications of the study findings for theory and research. Finally,
the last section presents conclusions.
2. PRIOR RESEARCH AND THEORETICAL FRAMEWORK
2.1. Cloud Computing and Higher Educational Environment
Cloud computing represents the convergence of two key trends in information technology: IT
efficiency and business agility. IT efficiency entails leveraging highly scalable hardware and
software resources to make better use of present computing capabilities. Business agility, on the
other hand, is the ability to use IT as a competitive tool through rapid development and mobile
interactive applications that respond instantly to user needs [19]; [17]. As a term, cloud
computing is defined variously in the literature. In this study, the definition of cloud computing
presented is compatible with NIST standards [20], which considers cloud computing as a
collection of characteristics shared by all cloud computing services. Consequently, in the context
of this paper, cloud computing refers to the applications and shared services used at the
institutions studied via subscription-based models, through which shared data servers or
application tasks can be made available. Cloud computing is continually altering the concepts of
learning and business. Accordingly, academics and the business sectors have adopted novel
technologies to remain contemporary with internal and external changes.
In higher education institutions, cloud computing has been considered mostly as a technical
advancement with transformational potential [21]. This is due to the fact that cloud computing
reaps the rewards of rapid IT implementation, particularly for research, which is considered more
favourably when compared with conventional software solutions. Furthermore, Cloud computing
technologies can be used as an aid in the implementation of socially oriented approaches to
learning as well as collaborative education [22]; [23]. Cloud computing resources can be utilized
to form e-learning platforms and educational services by centralizing data storage, virtualization,
and other services [24]. With these considerations in mind, cloud computing services are
becoming critical for various higher education institutions, and many of them rely on these
services to lower costs, maintain competitiveness, and meet student and educator needs [25].
Cloud computing services compose of several notions, can be utilized to improve students'
learning efficiency. According to Thomas [26], cloud computing allows students and educators to
engage with one another at any time from any location and collaborate on the same documents to
make modifications and improve the documents collectively. Many cloud-based applications
have the ability to enhance engagement and active learning among students, which subsequently
improves their performance [27]. For example, Checkpoints, Cloud, and Collaboration (C3) is a
learning framework that has been developed to improve learning outcomes. The C3 Framework
is designed to provide students with a structured approach to learning that incorporates the use of
technology and collaboration. The C3 Framework consists of three key components: checkpoints,
clouds, and collaboration. Checkpoints are used to monitor student progress and provide
feedback on their performance. The cloud component provides students with access to online
resources and tools that can be used for research, collaboration, and communication.
Collaboration is an essential component of the C3 framework as it encourages students to work
together on projects and assignments. The C3 framework has been shown to be effective in
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
70
improving learning outcomes by providing students with a more engaging and interactive
learning experience. By incorporating technology into the learning process, students are able to
access a wider range of resources and collaborate more effectively with their peers.
This framework is based on the idea that learning should be a collaborative process where
students work together to achieve their goals. The C3 Framework is designed to provide students
with the tools they need to collaborate effectively, including cloud-based technology and regular
checkpoints. The C3 framework is particularly useful for online learning environments, where
collaboration can be challenging due to the lack of face-to-face interaction. By using cloud-based
technology, students can easily share information and work together on projects in real-time.
Regular checkpoints also help to keep students on track and ensure that they are making progress
towards their goals. Overall, the C3 framework provides a powerful tool for improving learning
outcomes for students. By promoting collaboration and providing students with the tools they
need to succeed, this framework can help create a more engaging and effective learning
environment for all learners [27].
Use of cloud services such as Classroom, G-mail, Google Docs, Dropbox, I-Cloud, and Sky
Drive can be easily integrated into educational environments [11], which may efficiently improve
educational institutions' ability to offer facilities or satisfy students' learning needs without
investing in costly hardware or software or needing to train students [28]. Adoption of cloud
computing has grown and become more pertinent to academic students and educators over the
past few years. In response, it has become a growing trend among scholars to use several
technology adoption models to comprehend how higher education students and educators adopted
cloud computing [29]. For example, a study conducted by Asadi et al. [8] used the Theory of
Planned Behavior (TPB) to investigate the determinants of cloud computing services among 240
faculty members in a medical university. The study found that attitude, perceived
privacy/security, perceived behavioral control, intention, and subjective norms factors altogether
explained about 59% of individuals’ behaviors toward adoption of cloud computing services [8].
Another study by Chiniah et al, [30] proposed a Hybrid model include Technology-Organization
Environment Model (TOE) and Technology Acceptance Model (TAM) to evaluate the previously
identified determinants for cloud adoption/non-adoption by the Mauritius ICT industry. The
study surveyed 93 ICT-related companies/organizations and found that security is no longer the
major concern for cloud adoption and companies are more focused on the advantages cloud
computing can offer to their operations [30].
The literature review found that numerous studies on adoption of cloud computing in academic
institutions had been published and that the pace of publication had been growing in recent years.
IS scholars have often studied cloud computing adoption in higher education institutions from the
perspective of individuals [11]; [13] or organizations [31]; [32]. Several theoretical and practical
contributions have been examined, many of which imply that variables affecting the adoption of
cloud computing in higher education institutions are numerous. This study contributes to this
accumulated effort by proposing and developing a theoretical model that lends itself to
investigating factors influencing cloud computing adoption among higher education students in
Saudi Arabia.
2.2. The Decomposed Theory of Planned Behaviour (DTPB)
A deconstructed form of the TPB that combines a number of TAM and DOI elements is known
as the Decomposed Theory of Planned Behaviour (DTPB). In comparison to the TAM and TPB
models, it exhibits a similar match to the pure TPB model with a little higher predictive power
[33]. The decomposed Theory of Planned Behaviour, according to Taylor and Todd, focuses on
the aspects that are likely to impact system use to offer a more complete knowledge of
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
71
behavioural intention [33] and "enables application of the model to a variety of situations" [34]
because it makes the relationships between beliefs, attitudes, and intentions more transparent and
understandable. In the DTPB, attitudes, normative beliefs, and control beliefs are divided and
categorized according to the literature, the TAM and Diffusion of innovation theories. According
to theories put out by academics, normative belief may be separated into relevant groups of
references including subordinates, superiors, and peers each of whom has a unique viewpoint on
how IT should be used. Taylor and Todd [33] have so utilized the two groups of peers and
superiors to symbolize the breakdown of normative beliefs. In contrast, the control beliefs may be
split into two separate categories: self-efficacy and facilitating conditions. Self-efficacy refers to
one's perception of one's ability to use a new innovation, while the facilitating conditions group
offers two aspects for control beliefs: one relates to resource factors like time and money, and the
other concentrates on compatibility of technology difficulties which could constrain adoption
[35]; [34].
3. RESEARCH MODEL AND HYPOTHESES DEVELOPMENT
A modified version of the DTPB model was utilized in the current study to better understand the
factors influencing the decisions of higher education’ students to use cloud computing in Saudi
Arabia (see Figure 1). The next sub-sections provide a discussion of the model's structures as
well as the proposed hypotheses.
3.1. Trust and User Attitude
In any business transaction, trust is a crucial component, especially in technological settings
where there is uncertainty or insufficient product information [36]. Previous studies on the
adoption of cloud computing have not extensively studied trust as a multidimensional construct;
however, the majority of the literature supports the significance of a generalized trust construct as
a determinant in cloud computing adoption. To know the importance of trust in the use of cloud
computing, let's take a look at one of the aspects that requires trust and that affects the user's
attitude towards it.
Within the cloud computing context, the trusting intentions were subsequently influenced by the
trusting beliefs regarding cloud service providers, which predicted cloud adoption and success
factors [37]. When analysing trust in the cloud provider, trust includes all related expectations,
such as the conviction that the provider won't act opportunistically [37]. Cloud providers can
create adverse circumstances for organizations or individuals using their services, and moving
from one cloud provider to another can be costly and resource-intensive. Cloud providers may
use standards, closed architectures, proprietary software or complex licensing schemes to keep
customers captive [38]. It's also possible that a particular cloud provider will decide to disregard
agreements, rules, or guarantees, or will otherwise falsify compliance, or will exploit the client
organization in circumstances that aren't covered by the licensing agreement [37]. Thus, the
relationship between perceived trust in cloud service provider and individuals’ attitude toward the
cloud technology adoption, have been shown to be significant and the key antecedents of
behavioural intention to adopt the cloud [39]. Considering the above; the following hypothesis is
formulated:
H1. The trust in cloud service providers has a significant and positive influence on higher
education students ' attitudes toward the cloud.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
72
3.2. Perceived usefulness, perceived ease of use and user attitude
Perceived usefulness is a concept that has been widely studied in the field of psychology and
information systems. It refers to the degree to which an individual believes that a particular
product or service will be beneficial in achieving their goals or solving their problems [40].
Scholars investigated whether users are driven to embrace a new technology due to its usefulness
or fun. According to the findings of this study of [41], perceived usefulness is more influential
than perceived fun in deciding whether to accept or reject computer technology [41]. In
educational environment, perceived usefulness or relative advantages, and ease of use have been
demonstrated in many prior studies to be antecedent drivers or factors that have positive
influence on adoption of technology [42]; [43].
The perceived usefulness of using cloud computing for university students includes increased
accessibility, flexibility, collaboration, and cost-effectiveness. One of the significant advantages
of using cloud computing for university students is the ability to access course materials from
anywhere at any time. With cloud-based storage solutions like Google Drive or Dropbox,
students can easily upload and download lecture notes, assignments, and other study materials
from their laptops or mobile devices. This flexibility allows them to study on-the-go without
being tied down to a specific location. Another benefit of cloud computing for university students
is collaboration with peers and professors. Cloud-based platforms like Google Docs allow
multiple users to work on the same document simultaneously, making group projects more
manageable and efficient. Additionally, professors can share class notes or assignments with their
students through cloud-based learning management systems like Blackboard or Canvas. Another
of the main benefits of cloud computing is its simplicity. Students do not need to worry about
installing software or managing hardware, as everything is hosted in the cloud. This makes it
easier for them to focus on their studies without having to deal with technical issues. Another
advantage of cloud computing is its scalability. As students' needs change over time, they can
easily scale up or down their usage of cloud services without having to invest in additional
hardware or software licenses. Overall, the perceived ease of using cloud computing has made it
a popular choice among university students. Its simplicity and scalability make it a convenient
option for those who need to access their files and applications from anywhere at any time.
TAM that were proposed by Davis [40] to identify factors that influence users’ acceptance of new
technologies [44] proposes that two constructs (perceived ease of use and perceived usefulness)
form the behavioral beliefs to be predictors of an individual's attitude to IT, which in turn
determines their adoption of information technology. Within the main fundamentals of the TAM,
it hypothesized that user acceptance of information technology is determined by his or her
behavioral intention to use the IT, which can be predicted by his/her attitude towards using IT
and his/her perception about the usefulness related to use. Thus, the following four hypotheses
were occupied from the original TAM; however, they were adjusted for the existing study in
order to be appropriate in this context.
H2: Perceived usefulness of the cloud has a significant and positive influence on attitudes toward
the cloud.
H3: Perceived ease of use has a significant and positive influence on attitudes toward the cloud.
H4: Attitudes toward the cloud has a significant and positive influence on behavioral intention to
use the cloud.
H5: Behavioral intention has a significant and positive influence on the actual use of the cloud.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
73
3.3. Subjective Norm, Peer influences and user behavioural intention
An individual's perception of pressure from society from relevant referents to engage in or refrain
from doing something is known as the subjective norm. [45]; [46]. In other terms, people are
often interested in activities or objects if there is a positive attitude regarding them and think that
influential persons believe they must do this [46]. In this case, the behaviour is using cloud
technology for academic purposes; university students are heavily influenced by their peers when
it comes to adopting new technologies. If their peers are using cloud technology for academic
purposes, they are more likely to do so as well. This is because they feel that it is socially
acceptable and expected of them.
It refers to the perceived pressure from peers to use cloud-based services. Students tend to follow
what their friends are doing, and if their peers are using cloud-based services, they are likely to
do so as well. This is because students want to fit in with their social group and be seen as tech-
savvy. The group theory influence states that individuals often conform to the expectations of
others in order to deepen associations with them or, in some circumstances, to evade punishment
[47]; [48]. A student could think, for instance, that the teacher recommends using the e-learning
system. A favourable effect on the subjective norm may happen if the student is very motivated
to adhere to the teacher's expectations [48]. This further confirms the impact of subjective norm
on intentional behaviour. This lends credence the effect of subjective norm on intentional
behaviour. The theories of TPB [46] and TRA [45] use subjective norm to measure social effect
on intentional behaviour. Consequently, numerous earlier research [8]; [49]; [50] proposed a
positive correlation between behavioural intentions and subjective norms. Thus, we hypothesize
the following:
H6. The higher education students’ peer influences has a significant and positive influence on
their subjective norm toward the cloud.
H7. The higher education students’ subjective norm has a significant and positive influence on
their intention to adopt the cloud.
3.4. Self-Efficacy & Behavioural Intention
Self-efficacy refers the perception of a person’s ability to use new innovation. Self-efficacy is
related to a person's belief in his or her capacity to do a certain activity within a specified field
[51]; [48]. Self-efficacy is defined by Bandura [52] as "beliefs in one's capabilities to organize
and execute the courses of action required to produce given attainments" [52]. The association
among decisions regarding the usage of new technology and computer self-efficacy was
supported by additional research [53]; [51]; [44]; [54]; [55]; [56].
In the context of cloud usage in education, university students who have a greater level of self-
efficacy have a significant anticipation of being able use cloud computing successfully without
relying on ongoing help, and as a consequence, they find cloud computing advantageous. As a
result, they are more willing than others to adopt cloud computing [57]; [58]. Accordingly, we
propose that the self-efficacy construct indirectly influences on adoption behaviour with its
immediate impact on behavioural intention.
H8. The higher education students’ self-efficacy has a significant and positive impact on their
intention to adopt the cloud.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
74
Figure 1. The study model
4. RESEARCH METHODOLOGY
4.1. Measurement
Defining the concepts or constructs that a researcher intends to test, and then selecting proper
measuring methods to assess those constructs, is critical and has a substantial impact on the
accuracy of findings [1]. In this research, the survey instrument was created by the researcher to
test the study hypotheses. Items from prior studies were selected and included in the survey
questionnaire to evaluate the constructs, which ensuring the scale's face (content) validity. The
items have extensively employed in the majority of previous studies, which suggests that there is
probably researchers' subjective acceptance that these measuring instruments seem to accurately
represent the constructs of interest. In Table 1, the items created in this research for every
construct are provided along with the prior studies from which they were adapted.
4.2. Data Collection Procedures
The purpose of this research is to identify the factors effecting adoption of the cloud computing
phenomenon among higher education students in Saudi Arabia. To achieve the study goals, the
study's sample surveyed students of Shaqra and Imam Mohammad Ibn Saud Islamic universities.
A fully completed survey was obtained from 386 students. After checking the data for validity,
364 of them were deemed fit for use. In information systems research, an adequate sample size
for undertaking partial least squares (PLS) path analysis is critical [60]. A typical information
systems study would have at least 0.25 R-squared values, a 5% significance level, and 80%
statistical power. A sample size of 59 is thought to be adequate when using such attributes with a
maximum of three arrows pointing to a latent variable [61] as defined in the study's structural
equation model (see Figure 1). However, with the aforementioned parameters and factor loadings
of 0.5, the ideal sample size is 78 [60]. As a result, the sample size of 364 seemed to be more than
adequate for this study.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
75
5. DATA ANALYSIS AND RESULTS
5.1. Reliability and Validity
The instrument's internal consistency and reliability have been tested using the collected data
from the pilot study of every component in the instrument. The findings indicate that alpha values
ranged from .912 to .997, with a mean of .955 (see Table 2). This implies that each construct in
the model was reliable. The internal consistency was therefore adequate.
Table 1. List of items by construct
Construct Items Adapted from
Peer Influences
(PI)
My friends or my classmates would think that I should use
Cloud computing. (It have been used in the first and second
items to measure the Subjective Norm construct so will not be
used again)
[2]
Self-Efficacy
(SE)
I can use Cloud computing even if there was no one around to
show me how to do it
I can use Cloud computing with merely the online help
function as a guide.
I could easily utilize any of the Cloud computing websites on
my own if I wanted to.
Regardless of whether I had never used a system like it before,
I would be able to use Cloud computing.
[2]
[3]
Subjective
Norm
(SN)
My friends would think that I should use the Cloud computing
to achieve my needs
My colleagues/classmates would think that I should use the
Cloud computing to achieve my needs
People who are important to me would think that I should use
the Cloud computing to achieve my needs
[2],
[3].
Perceived
usefulness
(PU)
Cloud computing is more convenient than other traditional
options.
Cloud computing makes it easier to do my work
Cloud computing improves my work
Cloud computing help me to do my work more quickly
I think that Cloud computing is useful.
Overall, I think that using the Cloud computing is
advantageous.
[4],
[2],
[5].
Perceived
Ease of Use
(EU)
Learning to use cloud computing was easy for me
I find cloud computing easy to use
When I use cloud computing, the English language is not an
obstacle.
[4],
[2],
[5].
Attitude
(AT)
I have positive opinion in cloud computing.
I believe that using cloud computing is good to me.
I believe that using cloud computing is appropriate for me.
[6],
[3],
[7].
The trust in
cloud service
provider
(TT)
The cloud service provider guarantees the anonymity of users.
The cloud service provider ensures the security of my personal
data.
The cloud service provider is efficient and always works
reliably.
The cloud service provider is predictable and unchanging.
I can rely on the cloud service provider.
[8].
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
76
Behavioral
intention
(BI)
You intend to use cloud computing in next three months.
You anticipate continuing to use cloud computing in the
future.
[5],
[7].
Cloud
Computing
Usage
(US)
On average, each week you use your cloud account often.
Every morning, you check your cloud account [3],
[7].
Table 2. Cronbach's Alpha Reliability of Constructs
Construct Number of
Items
Cronbach's
Alpha
Self-Efficacy
(SE)
4 .969
Perceived
usefulness
(PU)
6 .962
Perceived
Ease of Use
(EU)
3 .945
Attitude
(AT)
3 .957
Peer Influences (PI) 1 .912
Subjective Norm (SN) 3 .964
The trust in cloud service
provider (TT)
5 .997
Behavioural intention
(BI)
2 .958
Cloud Computing Usage
(US)
2 .942
Overall alpha value 29 .955
Construct validity was verified by employing factor analysis to evaluate a principal component
analysis with a varimax rotation. This approach was used to assess the convergent and
discriminant validity of items. Convergent validity was evaluated by assessing whether or not
items from a variable converged on a single construct [67] and whether or not the factor loading
for each item was more than 0.45, as recommended by Comrey and Lee [68]. According to
Comrey and Lee [68], loadings more than 0.45 may be deemed reasonable, while loadings greater
than 0.55 could be rated good, 0.63 very good, and 0.71 exceptional. Examining the cross-
loading of items on various criteria indicated the discriminant validity. Table 3 shows that there is
no evidence of weak loading.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
77
Table 3. Construct-Based Item Factor Analysis
Items
(-1-) (-2-) (-3-) (-4-) (-5-) Its evaluation
SE1 .488 .314 .141 .307 .677 Very good > 0.63
SE2 .479 .525 .263 .224 .549 Fair > 0.45
SE3 .467 .312 .223 .340 .659 Very good > 0.63
SE4 .781 .470 .372 .065 .068 Excellent > 0.71
PU1 .543 .584 -.234 .355 .041 Good > 0.55
PU2 .580 .684 .327 -.015 .229 Very good > 0.63
PU3 .621 .532 -.292 .341 .163 Very good > 0.63
PU4 .675 .432 -.123 .451 .175 Very good > 0.63
PU5 .596 .551 -.194 .314 .189 Good > 0.55
PU6 .580 .684 .327 -.015 .229 Very good > 0.63
EU1 .736 .387 -.257 .385 .072 Excellent > 0.71
EU2 .467 .805 .257 -.034 -.131 Excellent > 0.71
EU3 .495 .752 .300 .132 .188 Excellent > 0.71
AT1 .678 .540 -.131 .238 .123 Very good > 0.63
AT2 .642 .460 -.161 .516 .047 Very good > 0.63
AT3 .560 .558 -.114 .412 .054 Good > 0.55
PI1 .499 .752 .291 .082 .226 Excellent > 0.71
SN1 .177 .139 .867 .223 .280 Excellent > 0.71
SN2 .173 .116 .746 .136 .554 Excellent > 0.71
SN3 .063 .131 .719 .181 .557 Excellent > 0.71
TT1 .270 .889 -.163 .140 .155 Excellent > 0.71
TT2 -.198 -.148 .835 -.213 -.143 Excellent > 0.71
TT3 .283 .897 -.171 .034 .182 Excellent > 0.71
TT4 -.289 -.207 .232 -.295 .799 Excellent > 0.71
TT5 .736 .387 -.257 .385 .072 Excellent > 0.71
BI1 .768 .478 -.152 .312 -.020 Excellent > 0.71
BI2 .758 .488 .392 .118 .056 Excellent > 0.71
US1 .630 .514 .355 .471 .020 Very good > 0.63
US1 .735 .527 -.135 .281 -.088 Excellent > 0.71
5.2. Hypotheses Testing
A theoretical model is proposed and developed in this study by adopting and extending TPB that
lends itself to investigating trust, peer influences, perceived ease of use, and perceived usefulness
as drivers of cloud adoption in Saudi Arabia (see Figure 2). The study’s model was formulated
through the testing of eight hypotheses. Pearson's correlation analysis was used to correlate all of
the research variables, as shown in Table 4. As a consequence of the substantial correlations
between the variables (p0.01), we used the regression model to test for multicollinearity by
assessing collinearity statistics such as the variance inflation factor (VIF) and tolerance. To
determine the existence of multicollinearity effects, we searched for any alerts produced by the
AMOS report that suggested a problem of multicollinearity. The results indicate no evidence of
multicollinearity. Furthermore, regression analysis was used to establish a framework for a more
thorough examination of the potential issue of multicollinearity. As per Table 5, the tolerance
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
78
values ranged between 0.949 and 0.400. The use of variance inflation factors (VIF) is the ideal
and only known method to assess collinearity. Although a variance inflation factor (VIF) of
below or equal to 10 (i.e., a tolerance of greater than 0.1) is commonly advised [62], a variance
inflation factor (VIF) greater than 4 suggests substantial multicollinearity problems in this
investigation. However, because the VIF values in the model ranged from 1.054 to 2.502, as
shown in Table 5, there were no VIF values greater than 4. As a result, no evidence of
multicollinearity was found.
Table 4. Variables correlation analysis
US BI AT PU EU TT SN SE
BI .747*
AT .785* .749*
PU .684* .566* .687*
EU .679* .638* .729* .740*
TT .600* .631* .720* .735* .620*
SN .559* .513* .531* .419* .325* .331*
SE .750* .658* .685* .566* .546* .526* .352*
PI .556* .678* .584* .490* .384* .429* .446* .502*
US: Usage, BI: Behavioural intention, AT: Attitude, PU: Perceived Usefulness, EU Perceived Ease of Use,
TT: trust in cloud service provider, SN: Subjective Norm, SE: Self-Efficacy, PI: Peer Influences.
* p ≤ 0.01
Table 5. Multicollinearity examination
Dependent
variable
Path
direction
Independent
variables
(predictors)
Collinearity Statistics
Tolerance VIF
Usage  Intention .400 2.502
Intention  Attitude (AT) .435 2.300
Intention

Subjective Norm
(SN)
.718 1.392
Intention  Self-efficacy (SE) .530 1.886
Attitude (AT)

The trust in cloud
service provider
(TT)
.457 2.188
Attitude (AT)  Perceived
Usefulness (PU) .661 1.513
Attitude (AT)  Perceived Ease of
Use (EU)
.619 1.616
Subjective Norm
(SN)
 Peer Influences
(PI)
.949 1.054
Multiple regression analysis was applied to evaluate the study's hypotheses after confirming that
all relevant requirements had been satisfactorily met.
"Intention" and "Usage" were engaged in the initial regression. As seen in Fig. 2, "Intention"
(0.747, Standardized path coefficient, p 0.05) is strongly and positively associated to "Usage"
(adjusted R²=0.56) (see Tables 6, 7, and 2). As a result, H8 is supported.
A regression analysis was then performed on "Behavioural Intention" using the three independent
variables "Self-Efficacy," "Attitude," and "Subjective Norm." According to the results, which are
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
79
depicted in Fig. 2, there is a significant relationship between "Behavioural Intention" and all three
variables (adjusted R²=0.619): "Attitude" (= 0.749, p<0.05 Standardized path coefficient),
"Subjective Norm" (= 0.513, p<0.05 Standardized path coefficient), and "Self-Efficacy" (= 0.658,
p<0.05 Standardized path coefficient) (see Figure 2, Table 6 and 7). Consequently, support is
provided for H5, H6, and H7.
Then, "Attitude" was regressed on the three independent variables (i.e. "Trust in cloud computing
service provider," "Perceived Usefulness," and "Perceived Ease of Use"). As shown in Fig. 2, the
findings show that all three variables (adjusted R²=0.649)—"Trust in cloud computing service
provider" (0.720, Standardized path coefficient, p 0.05), "Perceived usefulness" (0.687,
Standardized path coefficient, p 0.05), and "Perceived Ease of Use" (0.729, Standardized path
coefficient, p 0.05)—have a significant relationship with "Attitude" H1, H2, and H3 are therefore
supported.
Table 6. Coefficients for Proposed model
Dependent
variable
Path
direc
tion
Independent
variables
(predictors)
Unstandardized
Coefficients
Standardi
zed
Coefficie
nts
Adjusted
R²
t Sig.
B Std. Error Beta
Usage  Intention .772 .027 .747 .557 28.765 .000
Intention

Attitude
(AT)
.443 .034 .472 .619 12.909 .000
Intention

Subjective
Norm (SN)
.137 .024 .165 .619 5.806 .000
Intention

Self-
efficacy
(SE)
.303 .036 .276 .619 8.348 .000
Attitude (AT)

The trust in
cloud
service
provider
(TT)
.317 .028 .399 .649 11.531 .000
Attitude (AT)  Perceived
Usefulness
(PU)
.088 .043 .082 .649 2.807 .000
Attitude (AT)  Perceived
Ease of Use
(EU)
.478 .040 .421 .649 12.085 .000
Subjective
Norm (SN)
 Peer
Influences
(PI)
.459 .042 .398 .589 10.986 .000
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
80
Table 7. Weights of Regression Standardized
Criterion variable
Path
direction
Criterion variable
predictors
Estimate (Significance)
Usage  Intention .747 Significant
Intention  Attitude (AT) .749 Significant
Intention  Subjective Norm (SN) .513 Significant
Intention  Self-efficacy (SE) .658 Significant
Attitude (AT)

The trust in cloud service
provider (TT)
.720 Significant
Attitude (AT)  Perceived Usefulness (PU) .687 Significant
Attitude (AT)  Perceived Ease of Use
(EU)
.729 Significant
Subjective Norm (SN)  Peer Influences (PI) .446 Significant
"Peer Influences" and "Subjective Norm" were implemented in the final regression. As shown in
Fig. 2, "Peer Influences" (β=0.446, p 0.05 Standardized path coefficient) is shown to be
substantially and positively associated to "Subjective Norm" (adjusted R² = 0.589) (see Figure 2,
Table 6 and 7). As a result, H4 is supported.
Figure 2. The study model
6. DISCUSSION
One of the primary goals of this research was to identify the factors influencing cloud computing
adoption using the theoretical TPB concept. The author extended TPB to investigate drivers of
cloud adoption in Saudi Arabia by placing trust in the cloud computing service provider, peer
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
81
influences, perceived usefulness, and ease of use as new constructs within TPB. The study model
also investigated the factors influencing the decisions of higher education students in Saudi
Arabia to use cloud computing. The study's findings demonstrate that the proposed model
successfully explained a sizable portion of the variation in cloud adoption. All of the study
hypotheses are supported. Cloud users' attitudes toward cloud adoption were found to be
significantly influenced by perceived usefulness, perceived ease of use, and trust in cloud
computing service provider variables.
In an earlier study, the author devised a formula to approximate the contribution of each model's
factor to the explanatory power of the model [62].
Where:
= Participation of variable Ax in a model' explanatory power
= Square of beta coefficients or standardized coefficients of variable
= Model' explanatory power (y)
= Total of causal effects for the model’s constructs
The study applies the equation mentioned above to calculate the explanatory power of every
construct and its antecedents, as well as the rate at which each antecedent adds to a construct's
explanatory power. The formula was used to calculate how much the "attitude's" antecedents
contributed to its explanatory power. Table 8 summarizes the findings.
The findings demonstrate that university students' attitudes toward using cloud computing are
significantly influenced by perceived ease of use, trust in cloud computing service provider and
perceived usefulness, which have the ability to explain their attitude by 22.15%, 21.9% and
20.9% respectively.
Table 8. Attitude’s variables' participation in its explanatory power
Antecedents Attitude
Trust in cloud computing service provider
(TT)
21.9%
Perceived Usefulness (PU) 20.9%
Perceived Ease of Use (EU) 22.15%
Total 65.00%
This proposes that the perceived usefulness of cloud computing encourages university students to
use cloud computing to get their work done. Cloud computing has grown in popularity in recent
years, and it offers various potential benefits for university students. The perceived usefulness of
using cloud computing for university students includes increased accessibility, flexibility,
collaboration, and cost-effectiveness.
One of the most significant advantages of cloud computing is its accessibility. Students can
access their files and applications from any device with an internet connection, making it easier
to work on assignments and projects from anywhere. This feature also allows for greater
flexibility in terms of scheduling and location. Cloud computing also promotes collaboration
among students. With cloud-based tools such as Google Drive or Microsoft OneDrive, multiple
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
82
users can work on the same document simultaneously, making group projects more efficient and
effective.
By collaborating with peers and sharing knowledge about best practices for using cloud
computing platforms like Google Drive or Dropbox, students can streamline their work processes
and improve their productivity.
Moreover, knowledge sharing can also help students overcome any technical difficulties they
may encounter while using cloud computing tools. By working together and pooling their
resources, students can troubleshoot issues more efficiently and effectively than if they were
working alone [69].
Cloud computing is a technology that allows users to access and store data remotely, making it an
attractive option for students who need to collaborate on projects or access their work from
multiple devices. However, if the technology is difficult to learn and use, students may not see
the value in using it. Therefore, it is important for universities to provide training and support for
students to ensure they can effectively use cloud computing.
Additionally, the perceived usefulness of cloud computing may vary depending on the specific
needs of each student. For example, a student who primarily works alone may not see as much
benefit from using cloud computing as a student who frequently collaborates with others.
Moreover, cloud computing can be cost-effective for university students who may not have the
resources to purchase expensive software or hardware. Cloud-based services often offer
affordable subscription plans that allow students to access a variety of tools without breaking the
bank.
Overall, the perceived usefulness of using cloud computing for university students is undeniable.
Its accessibility, flexibility, collaboration features, and cost-effectiveness make it an attractive
option for modern-day learners seeking a more efficient way to study and complete academic
tasks.
While cloud computing can be a valuable tool for university students, its effectiveness depends
on how well it meets each individual's needs and how easily it can be learned.
The results illustrate that the perceived ease of use motivates university students to use cloud
computing to get their work done.
Cloud computing has become an increasingly popular technology among university students due
to its convenience and accessibility. However, the perceived ease of use of cloud computing can
have a significant impact on whether or not students choose to utilize this technology.
Perceived ease of use refers to the degree to which individuals believe that using a particular
technology will be effortless and straightforward. If students perceive cloud computing as
difficult or complicated to use, they may be less likely to adopt it for their academic needs.
On the other hand, if students perceive cloud computing as easy and user-friendly, they are more
likely to embrace it as a valuable tool for storing and accessing their coursework, collaborating
with peers, and completing assignments remotely. Therefore, it is crucial for universities to
ensure that their students receive adequate training and support in using cloud computing
technologies. By promoting the perceived ease of use of these tools among their student
population, universities can encourage greater adoption of cloud computing and enhance the
overall learning experience for their students.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
83
The study's results also show that the students’ attitudes toward cloud adoption were found to be
significantly influenced by their trust in cloud computing service providers. Trust in cloud
computing service providers refers to the confidence that users have in the reliability, security,
and privacy of their data stored on cloud servers.
Reliability is a crucial factor in building trust between service providers and their clients. In the
world of cloud computing, reliability is even more important as it involves the storage and
management of sensitive data. For university students, cloud computing has become an essential
tool for accessing course materials, collaborating with peers, and submitting assignments.
Service providers must ensure that their systems are reliable to maintain the trust of their clients.
This means having robust security measures in place to protect against cyber threats and ensuring
that data is backed up regularly to prevent loss. Service providers should also have a clear
communication plan in place to inform clients of any potential disruptions or downtime.
Students must also be confident that their data is secure and safe from unauthorized access or
theft. If they do not trust the service provider's ability to safeguard their data, they may be
hesitant to adopt cloud computing solutions. To build trust in cloud computing service providers,
universities should ensure that they partner with reputable and trustworthy companies with a
proven track record of providing secure and reliable services. Additionally, universities should
educate their students about best practices for securing their data when using cloud services. It is
essential for universities to ensure that their students' data is safe and secure while using these
services by partnering with trustworthy companies and educating them about best practices for
securing their data.
Cloud service providers must ensure that they have robust security measures in place to protect
student data from unauthorized access. They should also be transparent about how they collect,
store, and use student data. This transparency builds trust and reassures students that their
information is safe. When students trust cloud service providers, they are more likely to adopt
cloud computing as a means of storing and accessing their data. This adoption can lead to
increased productivity and collaboration among students. Thus, cloud service providers must
prioritize security and transparency to build trust among users. By doing so, they can help unlock
the full potential of cloud computing for educational purposes.
Once more, the Al-ghaith equation [62] was applied to determine the contribution of the students
―intention" antecedents to its explaining ability, and the findings are outlined in Table 9. The
findings demonstrates that "subjective norm" alone accounts for 33.95% of students' "intentions"
regarding adoption of cloud computing, followed by "attitude," which explains roughly 14.24%
of "behavioral intentions," and finally "self-efficacy," which explains 13.71%.
Table 9. Behavioural Intention variables' participation in its explanatory power
Antecedents Behavioural Intention
Attitude (AT) 14.24%
Subjective Norm (SN) 33.95%
Self-efficacy (SE) 13.71%
Total 61.90%
The study has shown that subjective norms play an important role in shaping students' attitudes
and intentions towards using cloud computing. Students who perceive high levels of social
pressure to adopt these technologies are more likely to view them positively and intend to use
them in their academic work.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
84
The subjective norm refers to the perceived social pressure that individuals feel to conform to
certain behaviors or beliefs. In the context of cloud computing, this can refer to the influence that
peers or other members of a student's social network have on their decision to use cloud-based
technologies.
Peer influences plays a crucial role in shaping the subjective norms and behaviors of university
students towards cloud computing. Peer influence refers to the impact that peers have on an
individual's behavior.
In the context of cloud computing, peer influence can play a significant role in shaping students'
behavior towards this technology. If their peers are using cloud computing and find it beneficial,
they may be more likely to adopt it themselves. Similarly, if their peers have negative
experiences with cloud computing, they may be less likely to use it. Students tend to follow their
peers' behavior when it comes to adopting new technologies such as cloud computing. The
perception that using cloud computing is socially acceptable among peers can significantly
impact their decision-making process.
Overall, peer influence and subjective norms are important factors that should be considered
when designing strategies to promote the adoption of cloud computing among university
students. By understanding these factors and addressing them appropriately, cloud service
providers can increase the likelihood that university’ students will embrace this technology and
reap its benefits. They can leverage peer influences by encouraging early adopters to share their
positive experiences with others.
Self-efficacy is the second crucial factor in determining an individual's intention to use cloud
computing. In the context of university students, self-efficacy can be defined as the belief in one's
ability to effectively use cloud computing technology for academic purposes. University students'
self-efficacy towards using cloud computing can be influenced by various factors such as their
prior experience, knowledge, and skills. The use of cloud computing has become increasingly
popular among university students due to its convenience and accessibility. However, some
students may lack the necessary skills or knowledge to use it effectively. This can lead to a
decrease in their self-efficacy towards using cloud computing.
To improve self-efficacy, universities can provide training programs or workshops that focus on
developing the necessary skills and knowledge required for effective use of cloud computing.
Additionally, providing access to resources such as online tutorials or support services can also
help increase self-efficacy. Thus, universities should focus on enhancing students' self-efficacy
by providing adequate training, resources, and support for using cloud computing technology.
This will not only increase their confidence but also improve their academic performance by
enabling them to access resources more efficiently. Therefore, it is important for universities to
recognize the significance of self-efficacy in promoting the adoption of new technologies such as
cloud computing among their students.
REFERENCES
[1] W. Liu, "Research on cloud computing security problem and strategy," in 2012 2nd international
conference on consumer electronics, communications and networks (CECNet), 2012.
[2] C. C. Chen and M. Nakayama, "Key factors increasing the trust and intention to adopt standard
cloud-based applications," International Journal of Information Systems and Change Management,
vol. 8, no. 2, pp. 144-159, 2016.
[3] ResearchAndMarkets, "Global cloud computing in higher education market, by institute type, by
application, by ownership, by deployment, by region, estimation & forecast, 2017 - 2027,"
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
85
ResearchAndMarkets, September 2021. [Online]. Available:
https://www.researchandmarkets.com/reports/5456925/global-cloud-computing-in-higher-education
. [Accessed 3 April 2022].
[4] C. Rodríguez Monroy, G. C. Almarcha Arias and Y. Núñez Guerrero, "The new cloud computing
paradigm: The way to IT seen as a utility," Latin American and Caribbean Journal of Engineering
Education, vol. 6, no. 2, pp. 24-31, 2012.
[5] Y. A. Qasem, S. Asadi, R. Abdullah, Y. Yah, R. Atan, M. A. Al-Sharafi and A. A. Yassin, "A multi-
analytical approach to predict the determinants of cloud computing adoption in higher education
institutions," Applied Sciences, vol. 10, no. 14, p. 4905, 2020.
[6] B. Alexander, Social networking in higher education. The Tower and the Cloud, EDUCAUSE,
2008, pp. 197-201..
[7] R. N. Katz, The gathering cloud: Is this the end of the middle. The tower and the cloud: Higher
education in the age of cloud computing, EDUCAUSE, 2008, pp. 2-42..
[8] Z. Asadi, M. Abdekhoda and H. Nadrian, "Cloud computing services adoption among higher
education faculties: development of a standardized questionnaire," Education and Information
Technologies, vol. 25, no. 1, pp. 175-191, 2020.
[9] N. Sultan, "Cloud computing for education: A new dawn?.," International Journal of Information
Management, vol. 30, no. 2, pp. 109-116, 2010.
[10] S. Ashtari and A. Eydgahi, "Student perceptions of cloud applications effectiveness in higher
education," Journal of computational science, vol. 23, pp. 173-180, 2017.
[11] I. Arpaci, "Antecedents and consequences of cloud computing adoption in education to achieve
knowledge management," Computers in Human Behavior, vol. 70, pp. 382-390, 2017.
[12] R. Estriegana, J. A. Medina-Merodio and R. Barchino, "Student acceptance of virtual laboratory and
practical work: An extension of the technology acceptance model," Computers & Education, vol.
135, pp. 1-14, 2019.
[13] J. A. González-Martínez, M. L. Bote-Lorenzo, E. Gómez-Sánchez and R. Cano-Parra, "Cloud
computing and education: A state-of-the-art survey," Computers & Education, vol. 80, pp. 132-151,
2015.
[14] G. Militaru, A. A. Purcărea, O. D. Negoiţă and A. Niculescu, "Examining cloud computing adoption
intention in higher education: exploratory study," in Exploring Services Science: 7th International
Conference, IESS 2016, Bucharest, Romania, 2016.
[15] A. Sharma and U. K. Singh, "Modelling of Smart Risk Assessment Approach for Cloud Computing
Environment using AI & supervised machine learning algorithms," Global Transitions Proceedings,
pp. 1-358, 3 June 2022.
[16] S. A. Sheik and A. P. Muniyandi, "Secure authentication schemes in cloud computing with glimpse
of artificial neural networks: A review," Cyber Security and Applications, vol. 1, p. 100002, 2023.
[17] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and A. Ghalsasi, "Cloud computing—The business
perspective," Decision support systems, vol. 51, no. 1, pp. 176-189, 2011.
[18] A. Khayer, M. S. Talukder, Y. Bao and M. Hossain, "Cloud computing adoption and its impact on
SMEs’ performance for cloud supported operations: A dual-stage analytical approach," Technology
in Society, vol. 60, p. 101225, 2020.
[19] O. Ali, A. Shrestha, M. Ghasemaghaei and G. Beydoun, "Assessment of complexity in cloud
computing adoption: A case study of local governments in Australia," Information Systems
Frontiers, vol. 24, no. 2, pp. 595-617, 2022.
[20] P. Mell and T. Grance, The NIST definition of cloud computing. U.S. Department of Commerce,
MD, USA: National Institute of Standards and Technology: Gaithersburg, 2011.
[21] M. A. Mohamed Hashim, I. Tlemsani and R. Matthews, "Higher education strategy in digital
transformation.," Education and Information Technologies, pp. 1-25, 2021.
[22] G. Thorsteinsson, T. Page and A. Niculescu, "Using virtual reality for developing design
communication," Studies in Informatics and Control, vol. 19, no. 1, pp. 93-106, 2010.
[23] F. P. Tulinayo, P. Ssentume and R. Najjuma, "Digital technologies in resource constrained higher
institutions of learning: a study on students’ acceptance and usability," International Journal of
Educational Technology in Higher Education, vol. 15, no. 1, pp. 1-19, 2018.
[24] A. El Mhouti, M. Erradi and A. Nasseh, "Using cloud computing services in e-learning process:
Benefits and challenges," Education and Information Technologies, vol. 23, pp. 893-909, 2018.
[25] R. Thavi, R. Jhaveri, V. Narwane, B. Gardas and N. Jafari Navimipour, "Role of cloud computing
technology in the education sector," Journal of Engineering, Design and Technology, 2021.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
86
[26] P. Y. Thomas, "Cloud computing: A potential paradigm for practising the scholarship of teaching
and learning," The Electronic Library, vol. 29, no. 2, pp. 214-224, 2011.
[27] K. Bagley, "Checkpoints, cloud and collaboration (C3): A learning framework to improve learning
outcomes for international students in computer science," Journal of Computing Sciences in
Colleges, vol. 33, no. 6, p. 22–28, 2018.
[28] B. G. Batista, C. G. Ferreira, D. M. Segura , D. M. Leite Filho and M. M. Peixoto, "A QoS-driven
approach for cloud computing addressing attributes of performance and security," Future
Generation Computer Systems, vol. 68, p. 260–274, 2016.
[29] M. Sharma, R. Gupta and P. Acharya, "Analysing the adoption of cloud computing service: A
systematic literature review," Global Knowledge, Memory and Communication, vol. 70, no. 1/2, pp.
114-153, 2020.
[30] A. Chiniah, A. E. Mungur and K. Naidoo Permal, "Evaluation of cloud computing adoption using a
hybrid TAM/TOE model," in Information Systems Design and Intelligent Applications, Singapore,
2019.
[31] A. N. Tashkandi and I. M. Al-Jabri, "Cloud computing adoption by higher education institutions in
Saudi Arabia: an exploratory study," Cluster Computing, vol. 18, pp. 1527-1537, 2015.
[32] Y. A. Qasem, R. Abdullah, Y. Yah, R. Atan, M. A. Al-Sharafi and M. Al-Emran, "Towards the
development of a comprehensive theoretical model for examining the cloud computing adoption at
the organizational level," Recent Advances in Intelligent Systems and Smart Applications, pp. 63-
74, 2021.
[33] S. Taylor and P. A. Todd, "Understanding information technology usage: A test of competing
models," Information systems research, vol. 6, no. 2, pp. 144-176, 1995.
[34] M. Hernandez and J. Mazzon, "Adoption of internet banking: proposition and implementation of an
integrated methodology approach," The International Journal of Bank Marketing, vol. 25, no. 2, pp.
72-88, 2007.
[35] Y. C. Ku, R. Chen and H. Zhang, "Why do users continue using social networking sites? An
exploratory study of members in the United States and Taiwan," Information & Management, vol.
50, no. 7, pp. 571-581, 2013.
[36] Z. Belkhamza and S. Wafa, "The Effect of Perceived Risk on the Intention to Use E-commerce: The
Case of Algeria," Journal of Internet Banking and Commerce, vol. 14, no. 1, pp. 1-10, 2009.
[37] J. Lansing and A. Sunyaev, "Trust in cloud computing: Conceptual typology and trust-building
antecedents," ACM sigmis database: The database for advances in Information Systems, vol. 47, no.
2, pp. 58-96, 2016.
[38] J. Opara-Martins, R. Sahandi and F. Tian, "Critical review of vendor lock-in and its impact on
adoption of cloud computing," in International Conference on Information Society (i-Society 2014),
IEEE, 2014.
[39] E. Udoh, "Technology acceptance model applied to the adoption of grid and cloud technology,"
International Journal of Grid and High Performance Computing (IJGHPC), vol. 4, no. 1, pp. 1-20,
2012.
[40] F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information
technology," MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989.
[41] M. Igbaria, S. J. Schiffman and T. J. Wieckowski, "The respective roles of perceived usefulness and
perceived fun in the acceptance of microcomputer technology," Behaviour & information
technology, vol. 13, no. 6, pp. 349-361, 1994.
[42] F. Abdullah and R. Ward, "Developing a General Extended Technology Acceptance Model for E-
Learning (GETAMEL) by analysing commonly used external factors," Computers in human
behavior, vol. 56, pp. 238-256, 2016.
[43] A. Granić and N. Marangunić, "Technology acceptance model in educational context: A systematic
literature review," British Journal of Educational Technology, vol. 50, no. 5, pp. 2572-2593, 2019.
[44] F. D. Davis, R. P. Bagozzi and P. R. Warshaw, "User acceptance of computer technology: A
comparison of two theoretical models," Management Science, vol. 35, no. 8, pp. 982-1003, 1989.
[45] I. Ajzen and M. Fishbein, Understanding Attitudes and Predicting Social Behaviour, Englewood
Cliffs, NJ: Prentice-Hall, 1980.
[46] I. Ajzen, "The theory of planned behaviour," Organizational Behaviour and Human Decision
Processes, vol. 50, no. 2, pp. 179-211, 1991.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
87
[47] M. Deutsch and H. Gerard, "Deutsch, M., & Gerard, H. (1995). A study of normative and
informational social influences upon individual judgment," Journal of Abnormal and Social
Psychology, vol. 51, pp. 624-36, 1995.
[48] Y. C. Lee, "An empirical investigation into factors influencing the adoption of an e-learning
system," Online Information Review, vol. 30, no. 5, pp. 517-541, 2006.
[49] E. J. Kim, J. J. Kim and S. H. Han, "Understanding student acceptance of online learning systems in
higher education: Application of social psychology theories with consideration of user
innovativeness," Sustainability, vol. 13, no. 2, p. 896, 2021.
[50] W. L. Shiau and P. Y. Chau, "Understanding behavioral intention to use a cloud computing
classroom: A multiple model comparison approach," Information & Management, vol. 53, no. 3, pp.
355-365, 2016.
[51] D. R. Compeau and C. A. Higgins, "Computer self-efficacy: development of a measure and initial
test," MIS Quarterly, vol. 19, no. 2, pp. 189-211, 1995.
[52] A. Bandura, "Self-efficacy: toward a unifying theory of behavioural change," Psychol Rev, vol. 84,
no. 2, pp. 191-215, 1997.
[53] D. R. Compeau and S. Huff, "Social cognitive theory and individual reactions to computing
technology: a longitudinal study," MIS Quarterly, vol. 23, no. 2, pp. 145-158, 1999.
[54] T. Hill, N. D. Smith and M. F. Mann, "Role of efficacy expectations in predicting the decision to
use advanced technologies: the case of computers," Journal of Applied Psychology, vol. 72, no. 2, p.
307– 313, 1997.
[55] M. Hsu and C. Chiu, "Internet self-efficacy and electronic service acceptance," Decision Support
Systems, vol. 38, no. 3, pp. 369-381, 2004.
[56] Igbaria and M. J. Iivari, "The effects of self-efficacy on computer usage," Omega, vol. 23, no. 6, p.
587–605, 1995.
[57] C. Huang, "Gender differences in academic self-efficacy: A meta-analysis," European journal of
psychology of education, vol. 28, pp. 1-35, 2013.
[58] T. Muthuprasad, S. Aiswarya, K. S. Aditya and G. K. Jha, "Students’ perception and preference for
online education in India during COVID-19 pandemic," Social sciences & humanities open, vol. 3,
no. 1, p. 100101, 2021.
[59] E. Bell, A. Bryman and B. Harley, Business research methods, Oxford university press, 2022.
[60] G. A. Marcoulides and C. Saunders, "Editor's comments: PLS: a silver bullet?," MIS quarterly, pp.
iii-ix, 2006.
[61] K. K. K. Wong, "Partial least squares structural equation modeling (PLS-SEM) techniques using
SmartPLS," Marketing Bulletin, vol. 24, no. 1, pp. 1-32, 2013.
[62] W. Al-Ghaith, "Understanding social network usage: impact of co-presence, intimacy, and
immediacy," International Journal of Advanced Computer Science and Applications, vol. 6, no. 8,
pp. 99-111, 2015.
[63] G. C. Moore and I. Benbasat, "Development of an instrument to measure the perceptions of
adopting an information technology innovation," Information systems research, vol. 2, no. 3, pp.
192-222, 1991.
[64] W. Al-Ghaith, "Applying and extending the Technology Acceptance Model to understand Social
Networking Sites (SNS) Usage: Toward proposing a comprehensive model," in Proceedings of the
The 3rd Multidisciplinary International Social Networks Conference on Social Informatics 2016,
Data Science 2016 (pp. 1-8), ACM, 2016.
[65] W. Al-Ghaith, "Emerging Applications on Smart Phones: The Role of Privacy Concerns and its
Antecedents on Smart Phones Usage," International Journal of Computer Science & Information
Technology (IJCSIT), vol. 13, 2021.
[66] J. Ejdys, "Building technology trust in ICT application at a university," International Journal of
Emerging Markets, 2018.
[67] G. Premkumar and K. Ramamurthy, "The role of Interorganizational and organizational factors of
the decision mode for adoption of interorganizational systems," Decision Science, vol. 26, no. 3, pp.
303-336, 1995.
[68] A. L. Comrey and H. B. Lee, A first course in factor analysis, N.J.:L.: Erlbaum Associates, 1992.
[69] Z. Ali, B. Gongbing and A. Mehreen, "Understanding and predicting academic performance through
cloud computing adoption: A perspective of technology acceptance model," Journal of Computers
in Education, vol. 5, pp. 297-327, 2018.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023
88
AUTHOR
Waleed A. Alghaith is an Associate Professor of Information systems at Imam
Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia. His areas of
expertise are information technology research, internet research, technology adoption, data
science, sentiment analysis, cloud computing, artificial intelligence and organizational
intelligence technologies. Email: waalghaith@imamu.edu.sa

More Related Content

Similar to Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust, Peer Influences, Perceived Usefulness and Ease of Use

CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHIJCSEA Journal
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHIJCSEA Journal
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
Sustainable Development for Higher Education Sector using Mobile Cloud with M...
Sustainable Development for Higher Education Sector using Mobile Cloud with M...Sustainable Development for Higher Education Sector using Mobile Cloud with M...
Sustainable Development for Higher Education Sector using Mobile Cloud with M...ijtsrd
 
A Review On Cloud Based Knowledge Management In Higher Education Institutions
A Review On Cloud Based Knowledge Management In Higher Education InstitutionsA Review On Cloud Based Knowledge Management In Higher Education Institutions
A Review On Cloud Based Knowledge Management In Higher Education InstitutionsSara Parker
 
Cloud 101 higher_education_wp
Cloud 101 higher_education_wpCloud 101 higher_education_wp
Cloud 101 higher_education_wpDuy Hoang Nguyen
 
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGijitcs
 
An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...
An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...
An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...IJMERJOURNAL
 
Risk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational InstitutionRisk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational Institutionijtsrd
 
Economic challenges of cloud computing in Iraqi educational institutions usin...
Economic challenges of cloud computing in Iraqi educational institutions usin...Economic challenges of cloud computing in Iraqi educational institutions usin...
Economic challenges of cloud computing in Iraqi educational institutions usin...nooriasukmaningtyas
 
Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Dr. Trilok Kumar Jain
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based LearningIRJET Journal
 
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...Vicki Cristol
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technologyKHakash
 
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...Michele Thomas
 
Agent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research AgendaAgent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research Agendaidescitation
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingDr Amira Bibo
 

Similar to Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust, Peer Influences, Perceived Usefulness and Ease of Use (20)

CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
Sustainable Development for Higher Education Sector using Mobile Cloud with M...
Sustainable Development for Higher Education Sector using Mobile Cloud with M...Sustainable Development for Higher Education Sector using Mobile Cloud with M...
Sustainable Development for Higher Education Sector using Mobile Cloud with M...
 
A Review On Cloud Based Knowledge Management In Higher Education Institutions
A Review On Cloud Based Knowledge Management In Higher Education InstitutionsA Review On Cloud Based Knowledge Management In Higher Education Institutions
A Review On Cloud Based Knowledge Management In Higher Education Institutions
 
Cloud 101 higher_education_wp
Cloud 101 higher_education_wpCloud 101 higher_education_wp
Cloud 101 higher_education_wp
 
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSA
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
 
An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...
An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...
An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...
 
Risk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational InstitutionRisk Management of Secure Cloud in Higher Educational Institution
Risk Management of Secure Cloud in Higher Educational Institution
 
Article 1
Article 1Article 1
Article 1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Economic challenges of cloud computing in Iraqi educational institutions usin...
Economic challenges of cloud computing in Iraqi educational institutions usin...Economic challenges of cloud computing in Iraqi educational institutions usin...
Economic challenges of cloud computing in Iraqi educational institutions usin...
 
Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based Learning
 
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technology
 
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
 
Agent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research AgendaAgent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research Agenda
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust, Peer Influences, Perceived Usefulness and Ease of Use

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 DOI: 10.5121/ijcsit.2023.15406 67 EXPLORING CLOUD COMPUTING ADOPTION IN HIGHER EDUCATIONAL ENVIRONMENT: AN EXTENSION OF THE TPB MODEL WITH TRUST, PEER INFLUENCES, PERCEIVED USEFULNESS AND EASE OF USE Waleed Al-Ghaith Imam Mohammad Ibn Saud Islamic University (IMSIU) ABSTRACT Cloud computing is regarded as the next generation of computing. It is progressively being used as a launching pad for digital innovation and organizational agility. Cloud computing is frequently used by private and public organizations due to its flexibility, collaboration, cost-effectiveness, and scalability. These characteristics make cloud computing indispensable for individuals and businesses such as higher education institutes. Several prior studies covered the technological facets of cloud-based contexts, including cloud security, scalability, and virtualization. However, it is contend that the main barrier to cloud computing isn't technical but cognitive or behavioural, and in particular attitudinal. Thus, this research aims to study higher education’ students’ attitudes and their intention to adopt cloud computing, with a specific concentration on the effect of trust, peer influences, perceived usefulness and ease of use in order to investigate the factors influencing the adoption of cloud computing in higher educational environment in Saudi Arabia. This study presents an extended Decomposed Theory of Planned Behaviour (DTPB) to include trust, peer influences, perceived usefulness and ease of use as a cognition, representing a person’s perception of social influence to perform or not perform a behaviour under consideration. The proposed model was able to explain 62% of the variance in behavioural intention and 65% of students' attitudes towards the adoption of cloud computing in higher educational environment. The study's findings show that the proposed model explained a significant amount of variation in cloud computing adoption. It suggests that the model expansion by incorporating trust, peer influences, perceived usefulness and ease of use factors were valuable explorations. Further, the findings demonstrate that university students' attitudes toward using cloud computing are significantly influenced by perceived ease of use, trust in cloud computing service provider and perceived usefulness, which have the ability to explain their attitude by 22.15%, 21.9% and 20.9% respectively. The result also shows that "subjective norm" alone explains 33.95% of students' "behavioural intentions" towards using cloud computing, followed by their "attitude," which explains around 14.24% of "behavioural intentions," and then university students’ "self-efficacy," with 13.71%.. KEYWORDS Cloud Computing, DTPB, Trust, Technology Acceptance, Peer influences, Perceived usefulness, Perceived ease of use. 1. INTRODUCTION Emerging innovations in cloud computing have piqued the interest of IT professionals across the world. Cloud computing is an advanced form of distributed networking that enables the sharing of hardware and software assets among various public and private sectors and businesses [1]. The
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 68 notion of "cloud computing" means the hardware and systems that are used to provide services, as well as the applications that are created and distributed via the Internet [2]. Cloud computing is regarded as the next generation of computing. It is progressively being used as a launching pad for digital innovation and organizational agility. Cloud computing is frequently used by private and public firms due to its cost-effectiveness, scalability, collaboration and flexibility. These characteristics make cloud computing indispensable for individuals and businesses such as higher education institutes. Research and Markets [3] reported that the global Cloud Computing in Higher Education market was worth more than us$ 2,182.4 million in 2020 and is expected to grow to USD 8,779.1 million by 2027. Cloud computing has emerged as a crucial technology in the modern era, and it is now designated the fifth utility following the four fundamental utilities, namely, electricity, water, gas, and telecommunication [4], [5]. Higher education institutions are experiencing difficulties with the recruitment of participants, the demand for IT, the quality of education services, and affordability [6]; [7]; [5]. Thus, higher education institutions work diligently to manage resources and offer better services [8]; [9]. Higher education institutions represented by educators and students have found the benefits offered by cloud computing, such as cost reduction, educational sustainability, and raising educational quality, an opportunity to achieve their goals [10]; [11]; [12]. The adoption of cloud computing in higher education institutions is gaining ground, but it is still considered to lag behind the commercial sector and even government organizations in this market [13]. Yet, it is increasingly becoming a necessary element of higher education institutions' offerings rather than an option, which has boosted competitiveness in the higher education market [14]. However, despite its numerous benefits, cloud computing still faces significant barriers among university students to adopt it. Many students are comfortable with traditional methods of storing data, such as USB drives or hard disks. They may also be skeptical about relying on third-party providers for their data storage needs. A number of earlier studies covered the technological facets of cloud contexts, including cloud scalability, virtualization, and security [15]; [16]. However, it is contend that the most significant barrier to cloud computing is not technical but rather cognitive or behavioural, particularly attitudinal [17]; [18]. Thus, this research aims to study university students’ students’ attitudes and their intention to adopt cloud computing, in order to investigate the factors influencing the adoption of cloud computing among higher education students in Saudi Arabia. This study develops a conceptual model based on the Theory of Planned Behaviour (TPB) that lends itself to investigating these factors. Moreover, this study extends TPB to investigate drivers of cloud adoption among higher education students in Saudi Arabia by placing peer influences, perceived usefulness, ease of use, and "trust" of cloud computing providers as new constructs within the TPB model. A quantity of research has recognized and anticipated the importance of "trust" in cloud computing providers, perceived ease of use, perceived usefulness and peer influences in cloud computing settings, but merely scarce scholars have investigated the impact these factors have on attitudes and behavioural intentions toward cloud computing usage. The study's objective is to further comprehend higher education students' attitudes toward cloud computing. This research will participate to the body of extant literature by elucidating the "trust" role in cloud computing providers, perceived ease of use, perceived usefulness and peer influences in cloud adoption behaviour. Additionally, it will validate whether the TPB is a reliable model based on its ability to explain higher education students' attitudes and intents in the cloud environment. This begs the following research question: what factors affect higher education students’ attitudes and their intention to adopt cloud computing? The rest of this paper addresses this question by presenting and extending the TPB as a potential theory for explaining differences in adoption behaviour. This paper is organized as follows: the following section presents relevant
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 69 earlier studies on cloud computing and the study's theoretical framework, which includes the TPB as the main theory that guides the development of the study model. The third section discusses the development of research hypotheses and the study model. The fourth section describes the study methodology, including its measurements and applied data collection procedures. The fifth section presents the research data analysis and its findings, which cover the reliability and validity of the study instrument and the hypotheses testing findings. The next section provides a discussion that includes the implications of the study findings for theory and research. Finally, the last section presents conclusions. 2. PRIOR RESEARCH AND THEORETICAL FRAMEWORK 2.1. Cloud Computing and Higher Educational Environment Cloud computing represents the convergence of two key trends in information technology: IT efficiency and business agility. IT efficiency entails leveraging highly scalable hardware and software resources to make better use of present computing capabilities. Business agility, on the other hand, is the ability to use IT as a competitive tool through rapid development and mobile interactive applications that respond instantly to user needs [19]; [17]. As a term, cloud computing is defined variously in the literature. In this study, the definition of cloud computing presented is compatible with NIST standards [20], which considers cloud computing as a collection of characteristics shared by all cloud computing services. Consequently, in the context of this paper, cloud computing refers to the applications and shared services used at the institutions studied via subscription-based models, through which shared data servers or application tasks can be made available. Cloud computing is continually altering the concepts of learning and business. Accordingly, academics and the business sectors have adopted novel technologies to remain contemporary with internal and external changes. In higher education institutions, cloud computing has been considered mostly as a technical advancement with transformational potential [21]. This is due to the fact that cloud computing reaps the rewards of rapid IT implementation, particularly for research, which is considered more favourably when compared with conventional software solutions. Furthermore, Cloud computing technologies can be used as an aid in the implementation of socially oriented approaches to learning as well as collaborative education [22]; [23]. Cloud computing resources can be utilized to form e-learning platforms and educational services by centralizing data storage, virtualization, and other services [24]. With these considerations in mind, cloud computing services are becoming critical for various higher education institutions, and many of them rely on these services to lower costs, maintain competitiveness, and meet student and educator needs [25]. Cloud computing services compose of several notions, can be utilized to improve students' learning efficiency. According to Thomas [26], cloud computing allows students and educators to engage with one another at any time from any location and collaborate on the same documents to make modifications and improve the documents collectively. Many cloud-based applications have the ability to enhance engagement and active learning among students, which subsequently improves their performance [27]. For example, Checkpoints, Cloud, and Collaboration (C3) is a learning framework that has been developed to improve learning outcomes. The C3 Framework is designed to provide students with a structured approach to learning that incorporates the use of technology and collaboration. The C3 Framework consists of three key components: checkpoints, clouds, and collaboration. Checkpoints are used to monitor student progress and provide feedback on their performance. The cloud component provides students with access to online resources and tools that can be used for research, collaboration, and communication. Collaboration is an essential component of the C3 framework as it encourages students to work together on projects and assignments. The C3 framework has been shown to be effective in
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 70 improving learning outcomes by providing students with a more engaging and interactive learning experience. By incorporating technology into the learning process, students are able to access a wider range of resources and collaborate more effectively with their peers. This framework is based on the idea that learning should be a collaborative process where students work together to achieve their goals. The C3 Framework is designed to provide students with the tools they need to collaborate effectively, including cloud-based technology and regular checkpoints. The C3 framework is particularly useful for online learning environments, where collaboration can be challenging due to the lack of face-to-face interaction. By using cloud-based technology, students can easily share information and work together on projects in real-time. Regular checkpoints also help to keep students on track and ensure that they are making progress towards their goals. Overall, the C3 framework provides a powerful tool for improving learning outcomes for students. By promoting collaboration and providing students with the tools they need to succeed, this framework can help create a more engaging and effective learning environment for all learners [27]. Use of cloud services such as Classroom, G-mail, Google Docs, Dropbox, I-Cloud, and Sky Drive can be easily integrated into educational environments [11], which may efficiently improve educational institutions' ability to offer facilities or satisfy students' learning needs without investing in costly hardware or software or needing to train students [28]. Adoption of cloud computing has grown and become more pertinent to academic students and educators over the past few years. In response, it has become a growing trend among scholars to use several technology adoption models to comprehend how higher education students and educators adopted cloud computing [29]. For example, a study conducted by Asadi et al. [8] used the Theory of Planned Behavior (TPB) to investigate the determinants of cloud computing services among 240 faculty members in a medical university. The study found that attitude, perceived privacy/security, perceived behavioral control, intention, and subjective norms factors altogether explained about 59% of individuals’ behaviors toward adoption of cloud computing services [8]. Another study by Chiniah et al, [30] proposed a Hybrid model include Technology-Organization Environment Model (TOE) and Technology Acceptance Model (TAM) to evaluate the previously identified determinants for cloud adoption/non-adoption by the Mauritius ICT industry. The study surveyed 93 ICT-related companies/organizations and found that security is no longer the major concern for cloud adoption and companies are more focused on the advantages cloud computing can offer to their operations [30]. The literature review found that numerous studies on adoption of cloud computing in academic institutions had been published and that the pace of publication had been growing in recent years. IS scholars have often studied cloud computing adoption in higher education institutions from the perspective of individuals [11]; [13] or organizations [31]; [32]. Several theoretical and practical contributions have been examined, many of which imply that variables affecting the adoption of cloud computing in higher education institutions are numerous. This study contributes to this accumulated effort by proposing and developing a theoretical model that lends itself to investigating factors influencing cloud computing adoption among higher education students in Saudi Arabia. 2.2. The Decomposed Theory of Planned Behaviour (DTPB) A deconstructed form of the TPB that combines a number of TAM and DOI elements is known as the Decomposed Theory of Planned Behaviour (DTPB). In comparison to the TAM and TPB models, it exhibits a similar match to the pure TPB model with a little higher predictive power [33]. The decomposed Theory of Planned Behaviour, according to Taylor and Todd, focuses on the aspects that are likely to impact system use to offer a more complete knowledge of
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 71 behavioural intention [33] and "enables application of the model to a variety of situations" [34] because it makes the relationships between beliefs, attitudes, and intentions more transparent and understandable. In the DTPB, attitudes, normative beliefs, and control beliefs are divided and categorized according to the literature, the TAM and Diffusion of innovation theories. According to theories put out by academics, normative belief may be separated into relevant groups of references including subordinates, superiors, and peers each of whom has a unique viewpoint on how IT should be used. Taylor and Todd [33] have so utilized the two groups of peers and superiors to symbolize the breakdown of normative beliefs. In contrast, the control beliefs may be split into two separate categories: self-efficacy and facilitating conditions. Self-efficacy refers to one's perception of one's ability to use a new innovation, while the facilitating conditions group offers two aspects for control beliefs: one relates to resource factors like time and money, and the other concentrates on compatibility of technology difficulties which could constrain adoption [35]; [34]. 3. RESEARCH MODEL AND HYPOTHESES DEVELOPMENT A modified version of the DTPB model was utilized in the current study to better understand the factors influencing the decisions of higher education’ students to use cloud computing in Saudi Arabia (see Figure 1). The next sub-sections provide a discussion of the model's structures as well as the proposed hypotheses. 3.1. Trust and User Attitude In any business transaction, trust is a crucial component, especially in technological settings where there is uncertainty or insufficient product information [36]. Previous studies on the adoption of cloud computing have not extensively studied trust as a multidimensional construct; however, the majority of the literature supports the significance of a generalized trust construct as a determinant in cloud computing adoption. To know the importance of trust in the use of cloud computing, let's take a look at one of the aspects that requires trust and that affects the user's attitude towards it. Within the cloud computing context, the trusting intentions were subsequently influenced by the trusting beliefs regarding cloud service providers, which predicted cloud adoption and success factors [37]. When analysing trust in the cloud provider, trust includes all related expectations, such as the conviction that the provider won't act opportunistically [37]. Cloud providers can create adverse circumstances for organizations or individuals using their services, and moving from one cloud provider to another can be costly and resource-intensive. Cloud providers may use standards, closed architectures, proprietary software or complex licensing schemes to keep customers captive [38]. It's also possible that a particular cloud provider will decide to disregard agreements, rules, or guarantees, or will otherwise falsify compliance, or will exploit the client organization in circumstances that aren't covered by the licensing agreement [37]. Thus, the relationship between perceived trust in cloud service provider and individuals’ attitude toward the cloud technology adoption, have been shown to be significant and the key antecedents of behavioural intention to adopt the cloud [39]. Considering the above; the following hypothesis is formulated: H1. The trust in cloud service providers has a significant and positive influence on higher education students ' attitudes toward the cloud.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 72 3.2. Perceived usefulness, perceived ease of use and user attitude Perceived usefulness is a concept that has been widely studied in the field of psychology and information systems. It refers to the degree to which an individual believes that a particular product or service will be beneficial in achieving their goals or solving their problems [40]. Scholars investigated whether users are driven to embrace a new technology due to its usefulness or fun. According to the findings of this study of [41], perceived usefulness is more influential than perceived fun in deciding whether to accept or reject computer technology [41]. In educational environment, perceived usefulness or relative advantages, and ease of use have been demonstrated in many prior studies to be antecedent drivers or factors that have positive influence on adoption of technology [42]; [43]. The perceived usefulness of using cloud computing for university students includes increased accessibility, flexibility, collaboration, and cost-effectiveness. One of the significant advantages of using cloud computing for university students is the ability to access course materials from anywhere at any time. With cloud-based storage solutions like Google Drive or Dropbox, students can easily upload and download lecture notes, assignments, and other study materials from their laptops or mobile devices. This flexibility allows them to study on-the-go without being tied down to a specific location. Another benefit of cloud computing for university students is collaboration with peers and professors. Cloud-based platforms like Google Docs allow multiple users to work on the same document simultaneously, making group projects more manageable and efficient. Additionally, professors can share class notes or assignments with their students through cloud-based learning management systems like Blackboard or Canvas. Another of the main benefits of cloud computing is its simplicity. Students do not need to worry about installing software or managing hardware, as everything is hosted in the cloud. This makes it easier for them to focus on their studies without having to deal with technical issues. Another advantage of cloud computing is its scalability. As students' needs change over time, they can easily scale up or down their usage of cloud services without having to invest in additional hardware or software licenses. Overall, the perceived ease of using cloud computing has made it a popular choice among university students. Its simplicity and scalability make it a convenient option for those who need to access their files and applications from anywhere at any time. TAM that were proposed by Davis [40] to identify factors that influence users’ acceptance of new technologies [44] proposes that two constructs (perceived ease of use and perceived usefulness) form the behavioral beliefs to be predictors of an individual's attitude to IT, which in turn determines their adoption of information technology. Within the main fundamentals of the TAM, it hypothesized that user acceptance of information technology is determined by his or her behavioral intention to use the IT, which can be predicted by his/her attitude towards using IT and his/her perception about the usefulness related to use. Thus, the following four hypotheses were occupied from the original TAM; however, they were adjusted for the existing study in order to be appropriate in this context. H2: Perceived usefulness of the cloud has a significant and positive influence on attitudes toward the cloud. H3: Perceived ease of use has a significant and positive influence on attitudes toward the cloud. H4: Attitudes toward the cloud has a significant and positive influence on behavioral intention to use the cloud. H5: Behavioral intention has a significant and positive influence on the actual use of the cloud.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 73 3.3. Subjective Norm, Peer influences and user behavioural intention An individual's perception of pressure from society from relevant referents to engage in or refrain from doing something is known as the subjective norm. [45]; [46]. In other terms, people are often interested in activities or objects if there is a positive attitude regarding them and think that influential persons believe they must do this [46]. In this case, the behaviour is using cloud technology for academic purposes; university students are heavily influenced by their peers when it comes to adopting new technologies. If their peers are using cloud technology for academic purposes, they are more likely to do so as well. This is because they feel that it is socially acceptable and expected of them. It refers to the perceived pressure from peers to use cloud-based services. Students tend to follow what their friends are doing, and if their peers are using cloud-based services, they are likely to do so as well. This is because students want to fit in with their social group and be seen as tech- savvy. The group theory influence states that individuals often conform to the expectations of others in order to deepen associations with them or, in some circumstances, to evade punishment [47]; [48]. A student could think, for instance, that the teacher recommends using the e-learning system. A favourable effect on the subjective norm may happen if the student is very motivated to adhere to the teacher's expectations [48]. This further confirms the impact of subjective norm on intentional behaviour. This lends credence the effect of subjective norm on intentional behaviour. The theories of TPB [46] and TRA [45] use subjective norm to measure social effect on intentional behaviour. Consequently, numerous earlier research [8]; [49]; [50] proposed a positive correlation between behavioural intentions and subjective norms. Thus, we hypothesize the following: H6. The higher education students’ peer influences has a significant and positive influence on their subjective norm toward the cloud. H7. The higher education students’ subjective norm has a significant and positive influence on their intention to adopt the cloud. 3.4. Self-Efficacy & Behavioural Intention Self-efficacy refers the perception of a person’s ability to use new innovation. Self-efficacy is related to a person's belief in his or her capacity to do a certain activity within a specified field [51]; [48]. Self-efficacy is defined by Bandura [52] as "beliefs in one's capabilities to organize and execute the courses of action required to produce given attainments" [52]. The association among decisions regarding the usage of new technology and computer self-efficacy was supported by additional research [53]; [51]; [44]; [54]; [55]; [56]. In the context of cloud usage in education, university students who have a greater level of self- efficacy have a significant anticipation of being able use cloud computing successfully without relying on ongoing help, and as a consequence, they find cloud computing advantageous. As a result, they are more willing than others to adopt cloud computing [57]; [58]. Accordingly, we propose that the self-efficacy construct indirectly influences on adoption behaviour with its immediate impact on behavioural intention. H8. The higher education students’ self-efficacy has a significant and positive impact on their intention to adopt the cloud.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 74 Figure 1. The study model 4. RESEARCH METHODOLOGY 4.1. Measurement Defining the concepts or constructs that a researcher intends to test, and then selecting proper measuring methods to assess those constructs, is critical and has a substantial impact on the accuracy of findings [1]. In this research, the survey instrument was created by the researcher to test the study hypotheses. Items from prior studies were selected and included in the survey questionnaire to evaluate the constructs, which ensuring the scale's face (content) validity. The items have extensively employed in the majority of previous studies, which suggests that there is probably researchers' subjective acceptance that these measuring instruments seem to accurately represent the constructs of interest. In Table 1, the items created in this research for every construct are provided along with the prior studies from which they were adapted. 4.2. Data Collection Procedures The purpose of this research is to identify the factors effecting adoption of the cloud computing phenomenon among higher education students in Saudi Arabia. To achieve the study goals, the study's sample surveyed students of Shaqra and Imam Mohammad Ibn Saud Islamic universities. A fully completed survey was obtained from 386 students. After checking the data for validity, 364 of them were deemed fit for use. In information systems research, an adequate sample size for undertaking partial least squares (PLS) path analysis is critical [60]. A typical information systems study would have at least 0.25 R-squared values, a 5% significance level, and 80% statistical power. A sample size of 59 is thought to be adequate when using such attributes with a maximum of three arrows pointing to a latent variable [61] as defined in the study's structural equation model (see Figure 1). However, with the aforementioned parameters and factor loadings of 0.5, the ideal sample size is 78 [60]. As a result, the sample size of 364 seemed to be more than adequate for this study.
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 75 5. DATA ANALYSIS AND RESULTS 5.1. Reliability and Validity The instrument's internal consistency and reliability have been tested using the collected data from the pilot study of every component in the instrument. The findings indicate that alpha values ranged from .912 to .997, with a mean of .955 (see Table 2). This implies that each construct in the model was reliable. The internal consistency was therefore adequate. Table 1. List of items by construct Construct Items Adapted from Peer Influences (PI) My friends or my classmates would think that I should use Cloud computing. (It have been used in the first and second items to measure the Subjective Norm construct so will not be used again) [2] Self-Efficacy (SE) I can use Cloud computing even if there was no one around to show me how to do it I can use Cloud computing with merely the online help function as a guide. I could easily utilize any of the Cloud computing websites on my own if I wanted to. Regardless of whether I had never used a system like it before, I would be able to use Cloud computing. [2] [3] Subjective Norm (SN) My friends would think that I should use the Cloud computing to achieve my needs My colleagues/classmates would think that I should use the Cloud computing to achieve my needs People who are important to me would think that I should use the Cloud computing to achieve my needs [2], [3]. Perceived usefulness (PU) Cloud computing is more convenient than other traditional options. Cloud computing makes it easier to do my work Cloud computing improves my work Cloud computing help me to do my work more quickly I think that Cloud computing is useful. Overall, I think that using the Cloud computing is advantageous. [4], [2], [5]. Perceived Ease of Use (EU) Learning to use cloud computing was easy for me I find cloud computing easy to use When I use cloud computing, the English language is not an obstacle. [4], [2], [5]. Attitude (AT) I have positive opinion in cloud computing. I believe that using cloud computing is good to me. I believe that using cloud computing is appropriate for me. [6], [3], [7]. The trust in cloud service provider (TT) The cloud service provider guarantees the anonymity of users. The cloud service provider ensures the security of my personal data. The cloud service provider is efficient and always works reliably. The cloud service provider is predictable and unchanging. I can rely on the cloud service provider. [8].
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 76 Behavioral intention (BI) You intend to use cloud computing in next three months. You anticipate continuing to use cloud computing in the future. [5], [7]. Cloud Computing Usage (US) On average, each week you use your cloud account often. Every morning, you check your cloud account [3], [7]. Table 2. Cronbach's Alpha Reliability of Constructs Construct Number of Items Cronbach's Alpha Self-Efficacy (SE) 4 .969 Perceived usefulness (PU) 6 .962 Perceived Ease of Use (EU) 3 .945 Attitude (AT) 3 .957 Peer Influences (PI) 1 .912 Subjective Norm (SN) 3 .964 The trust in cloud service provider (TT) 5 .997 Behavioural intention (BI) 2 .958 Cloud Computing Usage (US) 2 .942 Overall alpha value 29 .955 Construct validity was verified by employing factor analysis to evaluate a principal component analysis with a varimax rotation. This approach was used to assess the convergent and discriminant validity of items. Convergent validity was evaluated by assessing whether or not items from a variable converged on a single construct [67] and whether or not the factor loading for each item was more than 0.45, as recommended by Comrey and Lee [68]. According to Comrey and Lee [68], loadings more than 0.45 may be deemed reasonable, while loadings greater than 0.55 could be rated good, 0.63 very good, and 0.71 exceptional. Examining the cross- loading of items on various criteria indicated the discriminant validity. Table 3 shows that there is no evidence of weak loading.
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 77 Table 3. Construct-Based Item Factor Analysis Items (-1-) (-2-) (-3-) (-4-) (-5-) Its evaluation SE1 .488 .314 .141 .307 .677 Very good > 0.63 SE2 .479 .525 .263 .224 .549 Fair > 0.45 SE3 .467 .312 .223 .340 .659 Very good > 0.63 SE4 .781 .470 .372 .065 .068 Excellent > 0.71 PU1 .543 .584 -.234 .355 .041 Good > 0.55 PU2 .580 .684 .327 -.015 .229 Very good > 0.63 PU3 .621 .532 -.292 .341 .163 Very good > 0.63 PU4 .675 .432 -.123 .451 .175 Very good > 0.63 PU5 .596 .551 -.194 .314 .189 Good > 0.55 PU6 .580 .684 .327 -.015 .229 Very good > 0.63 EU1 .736 .387 -.257 .385 .072 Excellent > 0.71 EU2 .467 .805 .257 -.034 -.131 Excellent > 0.71 EU3 .495 .752 .300 .132 .188 Excellent > 0.71 AT1 .678 .540 -.131 .238 .123 Very good > 0.63 AT2 .642 .460 -.161 .516 .047 Very good > 0.63 AT3 .560 .558 -.114 .412 .054 Good > 0.55 PI1 .499 .752 .291 .082 .226 Excellent > 0.71 SN1 .177 .139 .867 .223 .280 Excellent > 0.71 SN2 .173 .116 .746 .136 .554 Excellent > 0.71 SN3 .063 .131 .719 .181 .557 Excellent > 0.71 TT1 .270 .889 -.163 .140 .155 Excellent > 0.71 TT2 -.198 -.148 .835 -.213 -.143 Excellent > 0.71 TT3 .283 .897 -.171 .034 .182 Excellent > 0.71 TT4 -.289 -.207 .232 -.295 .799 Excellent > 0.71 TT5 .736 .387 -.257 .385 .072 Excellent > 0.71 BI1 .768 .478 -.152 .312 -.020 Excellent > 0.71 BI2 .758 .488 .392 .118 .056 Excellent > 0.71 US1 .630 .514 .355 .471 .020 Very good > 0.63 US1 .735 .527 -.135 .281 -.088 Excellent > 0.71 5.2. Hypotheses Testing A theoretical model is proposed and developed in this study by adopting and extending TPB that lends itself to investigating trust, peer influences, perceived ease of use, and perceived usefulness as drivers of cloud adoption in Saudi Arabia (see Figure 2). The study’s model was formulated through the testing of eight hypotheses. Pearson's correlation analysis was used to correlate all of the research variables, as shown in Table 4. As a consequence of the substantial correlations between the variables (p0.01), we used the regression model to test for multicollinearity by assessing collinearity statistics such as the variance inflation factor (VIF) and tolerance. To determine the existence of multicollinearity effects, we searched for any alerts produced by the AMOS report that suggested a problem of multicollinearity. The results indicate no evidence of multicollinearity. Furthermore, regression analysis was used to establish a framework for a more thorough examination of the potential issue of multicollinearity. As per Table 5, the tolerance
  • 12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 78 values ranged between 0.949 and 0.400. The use of variance inflation factors (VIF) is the ideal and only known method to assess collinearity. Although a variance inflation factor (VIF) of below or equal to 10 (i.e., a tolerance of greater than 0.1) is commonly advised [62], a variance inflation factor (VIF) greater than 4 suggests substantial multicollinearity problems in this investigation. However, because the VIF values in the model ranged from 1.054 to 2.502, as shown in Table 5, there were no VIF values greater than 4. As a result, no evidence of multicollinearity was found. Table 4. Variables correlation analysis US BI AT PU EU TT SN SE BI .747* AT .785* .749* PU .684* .566* .687* EU .679* .638* .729* .740* TT .600* .631* .720* .735* .620* SN .559* .513* .531* .419* .325* .331* SE .750* .658* .685* .566* .546* .526* .352* PI .556* .678* .584* .490* .384* .429* .446* .502* US: Usage, BI: Behavioural intention, AT: Attitude, PU: Perceived Usefulness, EU Perceived Ease of Use, TT: trust in cloud service provider, SN: Subjective Norm, SE: Self-Efficacy, PI: Peer Influences. * p ≤ 0.01 Table 5. Multicollinearity examination Dependent variable Path direction Independent variables (predictors) Collinearity Statistics Tolerance VIF Usage  Intention .400 2.502 Intention  Attitude (AT) .435 2.300 Intention  Subjective Norm (SN) .718 1.392 Intention  Self-efficacy (SE) .530 1.886 Attitude (AT)  The trust in cloud service provider (TT) .457 2.188 Attitude (AT)  Perceived Usefulness (PU) .661 1.513 Attitude (AT)  Perceived Ease of Use (EU) .619 1.616 Subjective Norm (SN)  Peer Influences (PI) .949 1.054 Multiple regression analysis was applied to evaluate the study's hypotheses after confirming that all relevant requirements had been satisfactorily met. "Intention" and "Usage" were engaged in the initial regression. As seen in Fig. 2, "Intention" (0.747, Standardized path coefficient, p 0.05) is strongly and positively associated to "Usage" (adjusted R²=0.56) (see Tables 6, 7, and 2). As a result, H8 is supported. A regression analysis was then performed on "Behavioural Intention" using the three independent variables "Self-Efficacy," "Attitude," and "Subjective Norm." According to the results, which are
  • 13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 79 depicted in Fig. 2, there is a significant relationship between "Behavioural Intention" and all three variables (adjusted R²=0.619): "Attitude" (= 0.749, p<0.05 Standardized path coefficient), "Subjective Norm" (= 0.513, p<0.05 Standardized path coefficient), and "Self-Efficacy" (= 0.658, p<0.05 Standardized path coefficient) (see Figure 2, Table 6 and 7). Consequently, support is provided for H5, H6, and H7. Then, "Attitude" was regressed on the three independent variables (i.e. "Trust in cloud computing service provider," "Perceived Usefulness," and "Perceived Ease of Use"). As shown in Fig. 2, the findings show that all three variables (adjusted R²=0.649)—"Trust in cloud computing service provider" (0.720, Standardized path coefficient, p 0.05), "Perceived usefulness" (0.687, Standardized path coefficient, p 0.05), and "Perceived Ease of Use" (0.729, Standardized path coefficient, p 0.05)—have a significant relationship with "Attitude" H1, H2, and H3 are therefore supported. Table 6. Coefficients for Proposed model Dependent variable Path direc tion Independent variables (predictors) Unstandardized Coefficients Standardi zed Coefficie nts Adjusted R² t Sig. B Std. Error Beta Usage  Intention .772 .027 .747 .557 28.765 .000 Intention  Attitude (AT) .443 .034 .472 .619 12.909 .000 Intention  Subjective Norm (SN) .137 .024 .165 .619 5.806 .000 Intention  Self- efficacy (SE) .303 .036 .276 .619 8.348 .000 Attitude (AT)  The trust in cloud service provider (TT) .317 .028 .399 .649 11.531 .000 Attitude (AT)  Perceived Usefulness (PU) .088 .043 .082 .649 2.807 .000 Attitude (AT)  Perceived Ease of Use (EU) .478 .040 .421 .649 12.085 .000 Subjective Norm (SN)  Peer Influences (PI) .459 .042 .398 .589 10.986 .000
  • 14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 80 Table 7. Weights of Regression Standardized Criterion variable Path direction Criterion variable predictors Estimate (Significance) Usage  Intention .747 Significant Intention  Attitude (AT) .749 Significant Intention  Subjective Norm (SN) .513 Significant Intention  Self-efficacy (SE) .658 Significant Attitude (AT)  The trust in cloud service provider (TT) .720 Significant Attitude (AT)  Perceived Usefulness (PU) .687 Significant Attitude (AT)  Perceived Ease of Use (EU) .729 Significant Subjective Norm (SN)  Peer Influences (PI) .446 Significant "Peer Influences" and "Subjective Norm" were implemented in the final regression. As shown in Fig. 2, "Peer Influences" (β=0.446, p 0.05 Standardized path coefficient) is shown to be substantially and positively associated to "Subjective Norm" (adjusted R² = 0.589) (see Figure 2, Table 6 and 7). As a result, H4 is supported. Figure 2. The study model 6. DISCUSSION One of the primary goals of this research was to identify the factors influencing cloud computing adoption using the theoretical TPB concept. The author extended TPB to investigate drivers of cloud adoption in Saudi Arabia by placing trust in the cloud computing service provider, peer
  • 15. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 81 influences, perceived usefulness, and ease of use as new constructs within TPB. The study model also investigated the factors influencing the decisions of higher education students in Saudi Arabia to use cloud computing. The study's findings demonstrate that the proposed model successfully explained a sizable portion of the variation in cloud adoption. All of the study hypotheses are supported. Cloud users' attitudes toward cloud adoption were found to be significantly influenced by perceived usefulness, perceived ease of use, and trust in cloud computing service provider variables. In an earlier study, the author devised a formula to approximate the contribution of each model's factor to the explanatory power of the model [62]. Where: = Participation of variable Ax in a model' explanatory power = Square of beta coefficients or standardized coefficients of variable = Model' explanatory power (y) = Total of causal effects for the model’s constructs The study applies the equation mentioned above to calculate the explanatory power of every construct and its antecedents, as well as the rate at which each antecedent adds to a construct's explanatory power. The formula was used to calculate how much the "attitude's" antecedents contributed to its explanatory power. Table 8 summarizes the findings. The findings demonstrate that university students' attitudes toward using cloud computing are significantly influenced by perceived ease of use, trust in cloud computing service provider and perceived usefulness, which have the ability to explain their attitude by 22.15%, 21.9% and 20.9% respectively. Table 8. Attitude’s variables' participation in its explanatory power Antecedents Attitude Trust in cloud computing service provider (TT) 21.9% Perceived Usefulness (PU) 20.9% Perceived Ease of Use (EU) 22.15% Total 65.00% This proposes that the perceived usefulness of cloud computing encourages university students to use cloud computing to get their work done. Cloud computing has grown in popularity in recent years, and it offers various potential benefits for university students. The perceived usefulness of using cloud computing for university students includes increased accessibility, flexibility, collaboration, and cost-effectiveness. One of the most significant advantages of cloud computing is its accessibility. Students can access their files and applications from any device with an internet connection, making it easier to work on assignments and projects from anywhere. This feature also allows for greater flexibility in terms of scheduling and location. Cloud computing also promotes collaboration among students. With cloud-based tools such as Google Drive or Microsoft OneDrive, multiple
  • 16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 82 users can work on the same document simultaneously, making group projects more efficient and effective. By collaborating with peers and sharing knowledge about best practices for using cloud computing platforms like Google Drive or Dropbox, students can streamline their work processes and improve their productivity. Moreover, knowledge sharing can also help students overcome any technical difficulties they may encounter while using cloud computing tools. By working together and pooling their resources, students can troubleshoot issues more efficiently and effectively than if they were working alone [69]. Cloud computing is a technology that allows users to access and store data remotely, making it an attractive option for students who need to collaborate on projects or access their work from multiple devices. However, if the technology is difficult to learn and use, students may not see the value in using it. Therefore, it is important for universities to provide training and support for students to ensure they can effectively use cloud computing. Additionally, the perceived usefulness of cloud computing may vary depending on the specific needs of each student. For example, a student who primarily works alone may not see as much benefit from using cloud computing as a student who frequently collaborates with others. Moreover, cloud computing can be cost-effective for university students who may not have the resources to purchase expensive software or hardware. Cloud-based services often offer affordable subscription plans that allow students to access a variety of tools without breaking the bank. Overall, the perceived usefulness of using cloud computing for university students is undeniable. Its accessibility, flexibility, collaboration features, and cost-effectiveness make it an attractive option for modern-day learners seeking a more efficient way to study and complete academic tasks. While cloud computing can be a valuable tool for university students, its effectiveness depends on how well it meets each individual's needs and how easily it can be learned. The results illustrate that the perceived ease of use motivates university students to use cloud computing to get their work done. Cloud computing has become an increasingly popular technology among university students due to its convenience and accessibility. However, the perceived ease of use of cloud computing can have a significant impact on whether or not students choose to utilize this technology. Perceived ease of use refers to the degree to which individuals believe that using a particular technology will be effortless and straightforward. If students perceive cloud computing as difficult or complicated to use, they may be less likely to adopt it for their academic needs. On the other hand, if students perceive cloud computing as easy and user-friendly, they are more likely to embrace it as a valuable tool for storing and accessing their coursework, collaborating with peers, and completing assignments remotely. Therefore, it is crucial for universities to ensure that their students receive adequate training and support in using cloud computing technologies. By promoting the perceived ease of use of these tools among their student population, universities can encourage greater adoption of cloud computing and enhance the overall learning experience for their students.
  • 17. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 83 The study's results also show that the students’ attitudes toward cloud adoption were found to be significantly influenced by their trust in cloud computing service providers. Trust in cloud computing service providers refers to the confidence that users have in the reliability, security, and privacy of their data stored on cloud servers. Reliability is a crucial factor in building trust between service providers and their clients. In the world of cloud computing, reliability is even more important as it involves the storage and management of sensitive data. For university students, cloud computing has become an essential tool for accessing course materials, collaborating with peers, and submitting assignments. Service providers must ensure that their systems are reliable to maintain the trust of their clients. This means having robust security measures in place to protect against cyber threats and ensuring that data is backed up regularly to prevent loss. Service providers should also have a clear communication plan in place to inform clients of any potential disruptions or downtime. Students must also be confident that their data is secure and safe from unauthorized access or theft. If they do not trust the service provider's ability to safeguard their data, they may be hesitant to adopt cloud computing solutions. To build trust in cloud computing service providers, universities should ensure that they partner with reputable and trustworthy companies with a proven track record of providing secure and reliable services. Additionally, universities should educate their students about best practices for securing their data when using cloud services. It is essential for universities to ensure that their students' data is safe and secure while using these services by partnering with trustworthy companies and educating them about best practices for securing their data. Cloud service providers must ensure that they have robust security measures in place to protect student data from unauthorized access. They should also be transparent about how they collect, store, and use student data. This transparency builds trust and reassures students that their information is safe. When students trust cloud service providers, they are more likely to adopt cloud computing as a means of storing and accessing their data. This adoption can lead to increased productivity and collaboration among students. Thus, cloud service providers must prioritize security and transparency to build trust among users. By doing so, they can help unlock the full potential of cloud computing for educational purposes. Once more, the Al-ghaith equation [62] was applied to determine the contribution of the students ―intention" antecedents to its explaining ability, and the findings are outlined in Table 9. The findings demonstrates that "subjective norm" alone accounts for 33.95% of students' "intentions" regarding adoption of cloud computing, followed by "attitude," which explains roughly 14.24% of "behavioral intentions," and finally "self-efficacy," which explains 13.71%. Table 9. Behavioural Intention variables' participation in its explanatory power Antecedents Behavioural Intention Attitude (AT) 14.24% Subjective Norm (SN) 33.95% Self-efficacy (SE) 13.71% Total 61.90% The study has shown that subjective norms play an important role in shaping students' attitudes and intentions towards using cloud computing. Students who perceive high levels of social pressure to adopt these technologies are more likely to view them positively and intend to use them in their academic work.
  • 18. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 84 The subjective norm refers to the perceived social pressure that individuals feel to conform to certain behaviors or beliefs. In the context of cloud computing, this can refer to the influence that peers or other members of a student's social network have on their decision to use cloud-based technologies. Peer influences plays a crucial role in shaping the subjective norms and behaviors of university students towards cloud computing. Peer influence refers to the impact that peers have on an individual's behavior. In the context of cloud computing, peer influence can play a significant role in shaping students' behavior towards this technology. If their peers are using cloud computing and find it beneficial, they may be more likely to adopt it themselves. Similarly, if their peers have negative experiences with cloud computing, they may be less likely to use it. Students tend to follow their peers' behavior when it comes to adopting new technologies such as cloud computing. The perception that using cloud computing is socially acceptable among peers can significantly impact their decision-making process. Overall, peer influence and subjective norms are important factors that should be considered when designing strategies to promote the adoption of cloud computing among university students. By understanding these factors and addressing them appropriately, cloud service providers can increase the likelihood that university’ students will embrace this technology and reap its benefits. They can leverage peer influences by encouraging early adopters to share their positive experiences with others. Self-efficacy is the second crucial factor in determining an individual's intention to use cloud computing. In the context of university students, self-efficacy can be defined as the belief in one's ability to effectively use cloud computing technology for academic purposes. University students' self-efficacy towards using cloud computing can be influenced by various factors such as their prior experience, knowledge, and skills. The use of cloud computing has become increasingly popular among university students due to its convenience and accessibility. However, some students may lack the necessary skills or knowledge to use it effectively. This can lead to a decrease in their self-efficacy towards using cloud computing. To improve self-efficacy, universities can provide training programs or workshops that focus on developing the necessary skills and knowledge required for effective use of cloud computing. Additionally, providing access to resources such as online tutorials or support services can also help increase self-efficacy. Thus, universities should focus on enhancing students' self-efficacy by providing adequate training, resources, and support for using cloud computing technology. This will not only increase their confidence but also improve their academic performance by enabling them to access resources more efficiently. Therefore, it is important for universities to recognize the significance of self-efficacy in promoting the adoption of new technologies such as cloud computing among their students. REFERENCES [1] W. Liu, "Research on cloud computing security problem and strategy," in 2012 2nd international conference on consumer electronics, communications and networks (CECNet), 2012. [2] C. C. Chen and M. Nakayama, "Key factors increasing the trust and intention to adopt standard cloud-based applications," International Journal of Information Systems and Change Management, vol. 8, no. 2, pp. 144-159, 2016. [3] ResearchAndMarkets, "Global cloud computing in higher education market, by institute type, by application, by ownership, by deployment, by region, estimation & forecast, 2017 - 2027,"
  • 19. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 85 ResearchAndMarkets, September 2021. [Online]. Available: https://www.researchandmarkets.com/reports/5456925/global-cloud-computing-in-higher-education . [Accessed 3 April 2022]. [4] C. Rodríguez Monroy, G. C. Almarcha Arias and Y. Núñez Guerrero, "The new cloud computing paradigm: The way to IT seen as a utility," Latin American and Caribbean Journal of Engineering Education, vol. 6, no. 2, pp. 24-31, 2012. [5] Y. A. Qasem, S. Asadi, R. Abdullah, Y. Yah, R. Atan, M. A. Al-Sharafi and A. A. Yassin, "A multi- analytical approach to predict the determinants of cloud computing adoption in higher education institutions," Applied Sciences, vol. 10, no. 14, p. 4905, 2020. [6] B. Alexander, Social networking in higher education. The Tower and the Cloud, EDUCAUSE, 2008, pp. 197-201.. [7] R. N. Katz, The gathering cloud: Is this the end of the middle. The tower and the cloud: Higher education in the age of cloud computing, EDUCAUSE, 2008, pp. 2-42.. [8] Z. Asadi, M. Abdekhoda and H. Nadrian, "Cloud computing services adoption among higher education faculties: development of a standardized questionnaire," Education and Information Technologies, vol. 25, no. 1, pp. 175-191, 2020. [9] N. Sultan, "Cloud computing for education: A new dawn?.," International Journal of Information Management, vol. 30, no. 2, pp. 109-116, 2010. [10] S. Ashtari and A. Eydgahi, "Student perceptions of cloud applications effectiveness in higher education," Journal of computational science, vol. 23, pp. 173-180, 2017. [11] I. Arpaci, "Antecedents and consequences of cloud computing adoption in education to achieve knowledge management," Computers in Human Behavior, vol. 70, pp. 382-390, 2017. [12] R. Estriegana, J. A. Medina-Merodio and R. Barchino, "Student acceptance of virtual laboratory and practical work: An extension of the technology acceptance model," Computers & Education, vol. 135, pp. 1-14, 2019. [13] J. A. González-Martínez, M. L. Bote-Lorenzo, E. Gómez-Sánchez and R. Cano-Parra, "Cloud computing and education: A state-of-the-art survey," Computers & Education, vol. 80, pp. 132-151, 2015. [14] G. Militaru, A. A. Purcărea, O. D. Negoiţă and A. Niculescu, "Examining cloud computing adoption intention in higher education: exploratory study," in Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, 2016. [15] A. Sharma and U. K. Singh, "Modelling of Smart Risk Assessment Approach for Cloud Computing Environment using AI & supervised machine learning algorithms," Global Transitions Proceedings, pp. 1-358, 3 June 2022. [16] S. A. Sheik and A. P. Muniyandi, "Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review," Cyber Security and Applications, vol. 1, p. 100002, 2023. [17] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and A. Ghalsasi, "Cloud computing—The business perspective," Decision support systems, vol. 51, no. 1, pp. 176-189, 2011. [18] A. Khayer, M. S. Talukder, Y. Bao and M. Hossain, "Cloud computing adoption and its impact on SMEs’ performance for cloud supported operations: A dual-stage analytical approach," Technology in Society, vol. 60, p. 101225, 2020. [19] O. Ali, A. Shrestha, M. Ghasemaghaei and G. Beydoun, "Assessment of complexity in cloud computing adoption: A case study of local governments in Australia," Information Systems Frontiers, vol. 24, no. 2, pp. 595-617, 2022. [20] P. Mell and T. Grance, The NIST definition of cloud computing. U.S. Department of Commerce, MD, USA: National Institute of Standards and Technology: Gaithersburg, 2011. [21] M. A. Mohamed Hashim, I. Tlemsani and R. Matthews, "Higher education strategy in digital transformation.," Education and Information Technologies, pp. 1-25, 2021. [22] G. Thorsteinsson, T. Page and A. Niculescu, "Using virtual reality for developing design communication," Studies in Informatics and Control, vol. 19, no. 1, pp. 93-106, 2010. [23] F. P. Tulinayo, P. Ssentume and R. Najjuma, "Digital technologies in resource constrained higher institutions of learning: a study on students’ acceptance and usability," International Journal of Educational Technology in Higher Education, vol. 15, no. 1, pp. 1-19, 2018. [24] A. El Mhouti, M. Erradi and A. Nasseh, "Using cloud computing services in e-learning process: Benefits and challenges," Education and Information Technologies, vol. 23, pp. 893-909, 2018. [25] R. Thavi, R. Jhaveri, V. Narwane, B. Gardas and N. Jafari Navimipour, "Role of cloud computing technology in the education sector," Journal of Engineering, Design and Technology, 2021.
  • 20. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 86 [26] P. Y. Thomas, "Cloud computing: A potential paradigm for practising the scholarship of teaching and learning," The Electronic Library, vol. 29, no. 2, pp. 214-224, 2011. [27] K. Bagley, "Checkpoints, cloud and collaboration (C3): A learning framework to improve learning outcomes for international students in computer science," Journal of Computing Sciences in Colleges, vol. 33, no. 6, p. 22–28, 2018. [28] B. G. Batista, C. G. Ferreira, D. M. Segura , D. M. Leite Filho and M. M. Peixoto, "A QoS-driven approach for cloud computing addressing attributes of performance and security," Future Generation Computer Systems, vol. 68, p. 260–274, 2016. [29] M. Sharma, R. Gupta and P. Acharya, "Analysing the adoption of cloud computing service: A systematic literature review," Global Knowledge, Memory and Communication, vol. 70, no. 1/2, pp. 114-153, 2020. [30] A. Chiniah, A. E. Mungur and K. Naidoo Permal, "Evaluation of cloud computing adoption using a hybrid TAM/TOE model," in Information Systems Design and Intelligent Applications, Singapore, 2019. [31] A. N. Tashkandi and I. M. Al-Jabri, "Cloud computing adoption by higher education institutions in Saudi Arabia: an exploratory study," Cluster Computing, vol. 18, pp. 1527-1537, 2015. [32] Y. A. Qasem, R. Abdullah, Y. Yah, R. Atan, M. A. Al-Sharafi and M. Al-Emran, "Towards the development of a comprehensive theoretical model for examining the cloud computing adoption at the organizational level," Recent Advances in Intelligent Systems and Smart Applications, pp. 63- 74, 2021. [33] S. Taylor and P. A. Todd, "Understanding information technology usage: A test of competing models," Information systems research, vol. 6, no. 2, pp. 144-176, 1995. [34] M. Hernandez and J. Mazzon, "Adoption of internet banking: proposition and implementation of an integrated methodology approach," The International Journal of Bank Marketing, vol. 25, no. 2, pp. 72-88, 2007. [35] Y. C. Ku, R. Chen and H. Zhang, "Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan," Information & Management, vol. 50, no. 7, pp. 571-581, 2013. [36] Z. Belkhamza and S. Wafa, "The Effect of Perceived Risk on the Intention to Use E-commerce: The Case of Algeria," Journal of Internet Banking and Commerce, vol. 14, no. 1, pp. 1-10, 2009. [37] J. Lansing and A. Sunyaev, "Trust in cloud computing: Conceptual typology and trust-building antecedents," ACM sigmis database: The database for advances in Information Systems, vol. 47, no. 2, pp. 58-96, 2016. [38] J. Opara-Martins, R. Sahandi and F. Tian, "Critical review of vendor lock-in and its impact on adoption of cloud computing," in International Conference on Information Society (i-Society 2014), IEEE, 2014. [39] E. Udoh, "Technology acceptance model applied to the adoption of grid and cloud technology," International Journal of Grid and High Performance Computing (IJGHPC), vol. 4, no. 1, pp. 1-20, 2012. [40] F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989. [41] M. Igbaria, S. J. Schiffman and T. J. Wieckowski, "The respective roles of perceived usefulness and perceived fun in the acceptance of microcomputer technology," Behaviour & information technology, vol. 13, no. 6, pp. 349-361, 1994. [42] F. Abdullah and R. Ward, "Developing a General Extended Technology Acceptance Model for E- Learning (GETAMEL) by analysing commonly used external factors," Computers in human behavior, vol. 56, pp. 238-256, 2016. [43] A. Granić and N. Marangunić, "Technology acceptance model in educational context: A systematic literature review," British Journal of Educational Technology, vol. 50, no. 5, pp. 2572-2593, 2019. [44] F. D. Davis, R. P. Bagozzi and P. R. Warshaw, "User acceptance of computer technology: A comparison of two theoretical models," Management Science, vol. 35, no. 8, pp. 982-1003, 1989. [45] I. Ajzen and M. Fishbein, Understanding Attitudes and Predicting Social Behaviour, Englewood Cliffs, NJ: Prentice-Hall, 1980. [46] I. Ajzen, "The theory of planned behaviour," Organizational Behaviour and Human Decision Processes, vol. 50, no. 2, pp. 179-211, 1991.
  • 21. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 87 [47] M. Deutsch and H. Gerard, "Deutsch, M., & Gerard, H. (1995). A study of normative and informational social influences upon individual judgment," Journal of Abnormal and Social Psychology, vol. 51, pp. 624-36, 1995. [48] Y. C. Lee, "An empirical investigation into factors influencing the adoption of an e-learning system," Online Information Review, vol. 30, no. 5, pp. 517-541, 2006. [49] E. J. Kim, J. J. Kim and S. H. Han, "Understanding student acceptance of online learning systems in higher education: Application of social psychology theories with consideration of user innovativeness," Sustainability, vol. 13, no. 2, p. 896, 2021. [50] W. L. Shiau and P. Y. Chau, "Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach," Information & Management, vol. 53, no. 3, pp. 355-365, 2016. [51] D. R. Compeau and C. A. Higgins, "Computer self-efficacy: development of a measure and initial test," MIS Quarterly, vol. 19, no. 2, pp. 189-211, 1995. [52] A. Bandura, "Self-efficacy: toward a unifying theory of behavioural change," Psychol Rev, vol. 84, no. 2, pp. 191-215, 1997. [53] D. R. Compeau and S. Huff, "Social cognitive theory and individual reactions to computing technology: a longitudinal study," MIS Quarterly, vol. 23, no. 2, pp. 145-158, 1999. [54] T. Hill, N. D. Smith and M. F. Mann, "Role of efficacy expectations in predicting the decision to use advanced technologies: the case of computers," Journal of Applied Psychology, vol. 72, no. 2, p. 307– 313, 1997. [55] M. Hsu and C. Chiu, "Internet self-efficacy and electronic service acceptance," Decision Support Systems, vol. 38, no. 3, pp. 369-381, 2004. [56] Igbaria and M. J. Iivari, "The effects of self-efficacy on computer usage," Omega, vol. 23, no. 6, p. 587–605, 1995. [57] C. Huang, "Gender differences in academic self-efficacy: A meta-analysis," European journal of psychology of education, vol. 28, pp. 1-35, 2013. [58] T. Muthuprasad, S. Aiswarya, K. S. Aditya and G. K. Jha, "Students’ perception and preference for online education in India during COVID-19 pandemic," Social sciences & humanities open, vol. 3, no. 1, p. 100101, 2021. [59] E. Bell, A. Bryman and B. Harley, Business research methods, Oxford university press, 2022. [60] G. A. Marcoulides and C. Saunders, "Editor's comments: PLS: a silver bullet?," MIS quarterly, pp. iii-ix, 2006. [61] K. K. K. Wong, "Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS," Marketing Bulletin, vol. 24, no. 1, pp. 1-32, 2013. [62] W. Al-Ghaith, "Understanding social network usage: impact of co-presence, intimacy, and immediacy," International Journal of Advanced Computer Science and Applications, vol. 6, no. 8, pp. 99-111, 2015. [63] G. C. Moore and I. Benbasat, "Development of an instrument to measure the perceptions of adopting an information technology innovation," Information systems research, vol. 2, no. 3, pp. 192-222, 1991. [64] W. Al-Ghaith, "Applying and extending the Technology Acceptance Model to understand Social Networking Sites (SNS) Usage: Toward proposing a comprehensive model," in Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on Social Informatics 2016, Data Science 2016 (pp. 1-8), ACM, 2016. [65] W. Al-Ghaith, "Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage," International Journal of Computer Science & Information Technology (IJCSIT), vol. 13, 2021. [66] J. Ejdys, "Building technology trust in ICT application at a university," International Journal of Emerging Markets, 2018. [67] G. Premkumar and K. Ramamurthy, "The role of Interorganizational and organizational factors of the decision mode for adoption of interorganizational systems," Decision Science, vol. 26, no. 3, pp. 303-336, 1995. [68] A. L. Comrey and H. B. Lee, A first course in factor analysis, N.J.:L.: Erlbaum Associates, 1992. [69] Z. Ali, B. Gongbing and A. Mehreen, "Understanding and predicting academic performance through cloud computing adoption: A perspective of technology acceptance model," Journal of Computers in Education, vol. 5, pp. 297-327, 2018.
  • 22. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 4, August 2023 88 AUTHOR Waleed A. Alghaith is an Associate Professor of Information systems at Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia. His areas of expertise are information technology research, internet research, technology adoption, data science, sentiment analysis, cloud computing, artificial intelligence and organizational intelligence technologies. Email: waalghaith@imamu.edu.sa